Keylogging is typically an overlooked threat. This may be in part because most people don’t know about all of the forms of keyloggers, they really only know that their identity has been stolen or their Facebook has been hacked. Keylogging is a pretty simple process, and anyone with either money or basic computer skills can do it.
One type of keylogging that most people don’t know about would have to be acoustic. Acoustic keyloggers can be used to monitor the sound created by someone typing on a computer. Each and every key on the keyboard makes a subtly different acoustic signature when it is stroked. It is then possible to identify which keystroke signature relates to which keyboard character by acoustic analysis. The repetition frequency of similar acoustic keystroke signatures, the timings between different keyboard strokes and other context information such as the probable language in which the user is writing are used in this analysis to map sounds to letters. However a large number of key strokes is required in order to determine the exact keystrokes.
Another easy method of keylogging would have to be wireless sniffers. All the attacker has to do is find someone with a wireless keyboard. These sniffers work by collecting the packets of data being transferred from the keyboard to its receiver. Thus making it so anyone with a little extra money can be a keylogger.
The most common type of keylogging however is software based. Software based is usually hidden within malware and if left undetected can gather all your information an attacker would ever need to steal your identity and credit card information.
Keylogging is everywhere, the key to combating it is simple. If you’re useing wireless keyboards make sure it’s encrypted. If your going to be on your laptop in a public setting don’t check your banking. And finally you should always run regular virus and malware scans to avoid the software based attacks that could be lurking everywhere.