If you've been infected by a keylogger, removal of this malware is paramount in order to retain your personal and financial security. The next step is to prevent further occurrences, by installing appropriate security measures.
slide 1 of 3
How Do I get rid of a Keylogger?
Keylogging software can be introduced to computers via the Internet, allowing malicious coders to discover passwords and other personal details.
However there is more than one type of keylogger. As well as the malicious software keyloggers, there are also the tools employed by corporations to ensure their employees are not misusing facilities.
These take the form of either software or hardware – hardware keyloggers might be found as a small device between the keyboard and the PC, or they might be a separate device entirely, either inside the PC or connected by USB, for example.
Such hardware devices can be easily removed, although of course if your PC is provided by your employer, they won’t be happy if you’re removing devices for this reason!
slide 2 of 3
Software Keylogger – Removing A Security Threat
To prevent malicious characters from picking up your vital passwords and personal details, you will need to remove the keylogger tool, which might have come to your PC via an email attachment or by you or someone using your PC downloading something that while on the outside innocent, might just cause financial ruin.
Information gleaned from keylogging software can be used to break into online banking accounts or even get credit in your name. It’s a dangerous game.
In order to remove keylogging malware, you first need to know what it is, and where it is installed.
This can be difficult to ascertain – after all if it came in via email it could be in one of several temporary directories, and might still exist in your email folder. The best solution at this stage is security software specifically designed to detect such software. If your current anti-virus solution hasn’t detected the keylogger, then there is every reason to try a a spyware removal tool, such as the powerful donationware solution Spybot Search and Destroy, available from www.safer-networking.org.
slide 3 of 3
Prevention Always Comes First
If you have been caught out by this sort of scam – which often involved clicking on a link in an email or downloading what appears to be innocent software – you need to take steps to ensure that it never happens again.
For starters, you should change all of your passwords. This includes online banking, telephone banking (your telephone banking passphrase might be easily discerned from your personal details) and all other computer related and vital accounts.
Next, employ the use of mail scanning software (see this article for a selection of some freeware options) before beginning a regime of always running a virus scan on every file that you download. It is also a good idea to download to a specified folder on every occasion, and run regular scans on this location.
Finally, if you regularly use P2P download tools and networks, consider installing a free P2P security tool such as PeerBlock, available free from www.peerblock.com.