A keystroke logger can be hardware or software installed on a computer to secretly record keystrokes, and can be used for identity theft. They can be delivered within a Trojan horse, virus, program, or email attachment. Hardware keyloggers require direct access to the target computer. They can be used in the office to monitor employees […]