Skip main navigation

Keylogger Attacks

In this video, Zanidd will explain what a keylogger attack is. Watch and learn more about common ways these attacks occur.

This video will describe what a keylogger attack is and explains common ways these attacks are spread.

Keylogger attacks are one of the oldest forms of cyber threats. It reads and logs keystrokes and can recognize patterns to make finding passwords easier.

Keyloggers are spread through malware, USB sticks, and software and hardware bugs. It’s important to check files before opening and running them to make sure the action won’t spread a keylogger.

This article is from the free online

Advanced Cyber Security Training: Hands-On Password Attacks

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now