UnHacked Episode 12 Summary – Keystroke Loggers: Is Your Janitor the Problem?

Key Topics:

Keystroke Logger Types & Uses:

  • Hardware devices or software that capture keyboard input
  • Can record typed text, backspaces, and copied content
  • Used legitimately for employee monitoring, parental controls
  • Used maliciously for credential theft and unauthorized access

Real-World Examples:

  • LastPass Breach: DevOp engineer's home computer compromised via malware, leading to vault access
  • University student installed hardware keylogger on professor's computer to change grades, causing $67,500 in investigation costs

Schedule Your Free Security Assessment

Prevention Strategies:

  • Implement physical security measures for workstations
  • Use company-issued devices with restricted software installation
  • Consider encrypted keyboards for high-risk positions
  • Deploy security tools to detect malicious software
  • Conduct regular third-party security assessments

Key Discussion Points:

  • Password managers remain recommended despite risks
  • Two-factor authentication adds security but isn't foolproof
  • Work-from-home creates new security challenges
  • Physical security often overlooked in cybersecurity planning

The hosts emphasized the importance of layered security approaches and regular third-party assessments, directing listeners to www.unhacked.live for free vulnerability assessments.