Are there any commercially available (or not) hardware keylogger chip that someone could solder/plug to a phones LCD?
Title says it all.
Are there any keylogger chips for phone LCDs?
Collaborate Disseminate
Title says it all.
Are there any keylogger chips for phone LCDs?
I’m not talking about software keyloggers that are, well, quite obviously, software.
I’m talking about the nasty things that physically sit somewhere between your keyboard and processors. So I imagine that because of this, it would very ha… Continue reading Can software EVER pick up physical keyloggers? And what do they actually look like?
For example, bad USB cable( charging devices) loaded with script to record the unlock code of an android phone which is current being charged.
so basically, the bad usb cable and the usb charger is key logger, keep track of what is being t… Continue reading Is it possibile to capture unlock pin of smartphone(android/ios) using usb cable?
Is there any way to tell whether a Windows 10/11 computer has a keylogger running without the user knowing?
Continue reading Is there any way to tell if you have a keylogger infected on your computer?
Objective
I’ve come into possession of some data that I’d like to protect. If an attacker destroys or corrupts my data, I can tolerate that; Plenty of backups exist. But I can’t tolerate an outsider reading the data.
My hypothetical attack… Continue reading How vulnerable is my Veracrypt-protected data to key logging attack via Windows?
I have just recently started studying cybersecurity, although I haven’t made my own tool yet, nor understand how to use any other tool, I just decided to learn the whole theory before diving into real action.
I think worms are one of the m… Continue reading Can a keylogger actually work as a worm? [closed]
An owner of a company asked me to create and install a keylogger on all of his worker’s laptops (the laptops are given by the owner to the workers and under company policy they should be only used for work). I asked him "Will they kno… Continue reading Risks to developer for coding an employee keylogger for a business [closed]
Cybercriminals attack government, law enforcement, non-profit organizations, agricultural and commercial companies by slipping a cryptominer, keylogger, and backdoor into their systems. Continue reading Money-making scripts attack organizations
I would like to ask, if Firejails on Linux, protects when clicking a malicious link in the browser e.g. from downloading a keylogger or a trojan.
Continue reading Can Firejails protect against malicious links?
I am developing software for my client.
The software is a game controller configuration and enhancement software that runs on Windows machines.
I needed a feature to map keyboard keypresses to controller buttons. I found that Windows has a… Continue reading Using low level keyboard windows hook to read key presses & still being ‘trusted’ [migrated]