UnHacked Episode 12 Summary – Keystroke Loggers: Is Your Janitor the Problem?
Key Topics:
Keystroke Logger Types & Uses:
- Hardware devices or software that capture keyboard input
- Can record typed text, backspaces, and copied content
- Used legitimately for employee monitoring, parental controls
- Used maliciously for credential theft and unauthorized access
Real-World Examples:
- LastPass Breach: DevOp engineer's home computer compromised via malware, leading to vault access
- University student installed hardware keylogger on professor's computer to change grades, causing $67,500 in investigation costs
Schedule Your Free Security Assessment
Prevention Strategies:
- Implement physical security measures for workstations
- Use company-issued devices with restricted software installation
- Consider encrypted keyboards for high-risk positions
- Deploy security tools to detect malicious software
- Conduct regular third-party security assessments
Key Discussion Points:
- Password managers remain recommended despite risks
- Two-factor authentication adds security but isn't foolproof
- Work-from-home creates new security challenges
- Physical security often overlooked in cybersecurity planning
The hosts emphasized the importance of layered security approaches and regular third-party assessments, directing listeners to www.unhacked.live for free vulnerability assessments.