Can software EVER pick up physical keyloggers? And what do they actually look like?

I’m not talking about software keyloggers that are, well, quite obviously, software.
I’m talking about the nasty things that physically sit somewhere between your keyboard and processors. So I imagine that because of this, it would very ha… Continue reading Can software EVER pick up physical keyloggers? And what do they actually look like?

Is it possibile to capture unlock pin of smartphone(android/ios) using usb cable?

For example, bad USB cable( charging devices) loaded with script to record the unlock code of an android phone which is current being charged.
so basically, the bad usb cable and the usb charger is key logger, keep track of what is being t… Continue reading Is it possibile to capture unlock pin of smartphone(android/ios) using usb cable?

How vulnerable is my Veracrypt-protected data to key logging attack via Windows?

Objective
I’ve come into possession of some data that I’d like to protect. If an attacker destroys or corrupts my data, I can tolerate that; Plenty of backups exist. But I can’t tolerate an outsider reading the data.
My hypothetical attack… Continue reading How vulnerable is my Veracrypt-protected data to key logging attack via Windows?

Using low level keyboard windows hook to read key presses & still being ‘trusted’ [migrated]

I am developing software for my client.
The software is a game controller configuration and enhancement software that runs on Windows machines.
I needed a feature to map keyboard keypresses to controller buttons. I found that Windows has a… Continue reading Using low level keyboard windows hook to read key presses & still being ‘trusted’ [migrated]