DATA DOCTORS

How can I tell if a keylogger has been installed on my devices?

Jun 9, 2018, 11:00 AM

(Pexels photo)...

(Pexels photo)

(Pexels photo)

Q: How can I tell if a keylogger has been installed on my computer and smartphone?

A: Keyloggers are programs used to silently record keystrokes that can be part of a parental control program or as a nefarious program used by remote hackers to steal information.

Detecting keyloggers can range from being very easy to very difficult depending upon how and what was installed.


Methods of infection

Keyloggers can be installed through random infections or through direct access to your device.

If you don’t keep your security software, operating system and utilities up-to-date, random exploits from a wide variety of sources on the internet can allow a keylogger to be installed.

If someone gains access to your unlocked device, it’s the easiest way to install any number of programs that can record your keystrokes and capture screenshots.

Basic detection methods

When commercial programs are used, such as parental controls, they are often detectable by searching through the installed apps or programs on the device. If found, the removal of the tracking program is generally all that’s needed to ensure that no keystrokes will be recorded from then on.

If you do find such a program, you may want to look at any logs that have been created before you remove the program so you’ll know what information has been gathered by it.

Another simple thing to check is for a small hardware device connected between the end of the keyboard cable and the keyboard input on the computer.

If your computer seems to lag when you are typing things, it could be an indication of a keylogger, although many other scenarios can contribute to this symptom as well. In any case, determining why your computer is lagging is a good idea.

Advanced detection methods

If you’re technically inclined with Windows, you can examine running processes via the Task Manager to search for extra instances of winlogon.exe or other unusual .exe processes that are running. You’ll also want to check all the startup entries for anything unusual.

Advanced Mac users can use the Activity Monitor in Utilities to examine running processes for anything suspicious looking as well.

You’ll also want to check your security software to make sure that a strange program has not been added to the ‘exceptions’ list in your program’s settings.

Software protection programs

There are a number of programs designed to either prevent or detect keyloggers from infecting your device.

Start by checking your existing security program for keylogger protection features and make sure they are up-to-date. If not, options such as MalwareBytes Anti-Rootkit tool (Windows) or Chkrootkit (Mac: – http://chkrootkit.org) can be used to search your system for signs of suspicious programs.

Smartphone access

Installing keyloggers on smartphones is most likely to happen when someone is able to gain access to an unlocked device and physically install a program, so make sure you have a lock code setup and lock your phone whenever you aren’t using it.

Unless you’ve been infected by a state sponsored hacker, resetting a smartphone to factory defaults will wipe everything out and allow you to start over with a clean device.

Data Doctors

I need some Arizona tech tips. Will I lose all my saved passwords if I clear the cache in my browse...

Data Doctors

Arizona tech tips: How to clear your browsing data

Q: I need some Arizona tech tips. Will I lose all my saved passwords if I clear the cache in my browser? A: Here's what you need to know.

1 day ago

USB-C on iPhone...

Ken Colburn, Data Doctors

An explanation of the confusing state of USB-C cables

Q: If USB-C is a connection standard, what do the expensive cables do for me over the cheap ones? Here's a quick and simple answer.

8 days ago

woman at printer...

Data Doctors

Here’s how to bypass your printer when filling out forms

A major issue with having a printer in harsh environments is that printer jets can become clogged when they are rarely used, so I’d suggest an alternative.

15 days ago

man holds cellphone...

Ken Colburn, Data Doctors

Here’s what to do if you think your phone is listening to your conversations

As scary as it may seem that big tech is listening to everything we say, the reality of what they are doing is much more invasive.

22 days ago

(Photo by Kirk McKoy/Los Angeles Times via Getty Images)...

Ken Colburn, Data Doctors

Hard drive maintenance tips everyone should know

Depending upon the age and type of hard drive, the potential failures can be mechanical or electronic so the first thing to do is pay attention!

29 days ago

laptop opened on desk...

Data Doctors

Here are 5 critical security tips for your laptop you need to know

There are very significant threats you should protect against and know what to do should you find yourself dealing with them.

1 month ago

Sponsored Articles

...

Ignite Digital

How to unlock the power of digital marketing for Phoenix businesses

All businesses around the Valley hopes to maximize their ROI with current customers and secure a greater market share in the digital sphere.

...

Mayo Clinic

Game on! Expert sports physicals focused on you

With tryouts quickly approaching, now is the time for parents to schedule physicals for their student-athlete. The Arizona Interscholastic Association requires that all student-athletes must have a physical exam completed before participating in team practices or competition.

...

OCD & Anxiety Treatment Center

5 mental health myths you didn’t know were made up

Helping individuals understand mental health diagnoses like obsessive compulsive spectrum disorder or generalized anxiety disorder isn’t always an easy undertaking. After all, our society tends to spread misconceptions about mental health like wildfire. This is why being mindful about how we talk about mental health is so important. We can either perpetuate misinformation about already […]

How can I tell if a keylogger has been installed on my devices?