• Why is malware with keyloggers less effective than two-factor hardware tokens?

    Why malware with keyloggers are less effective on two-factor hardware tokens because of the additional protections from the hardware design? Can you explain more how HW design like CAC or Smart card or Alt-token in this case? Regards, Dzung Nguyen

    nrp02347475 pointsBadges:
  • How can I tell if there’s a keylogger installed on my computer?

    A WhatIs.com member wants to know: Is there any "test" one can do to see if a Keylogger program has been accidentally downloaded as a result of installing a new program? How can you find out if a Keylogger program is on your system?

    ResearchAssistant855 pointsBadges:
  • Can REFOG be accidentally installed with a game file?

    Suddenly I have REFOG keylogger on my laptop. My boyfriend insists that it was accidentally downloaded in a game file. What I want to know is if this is even possible, or must it be intentionally installed?

    Lin15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.