This Yahoo article is claiming that phishers are increasingly employing key loggers to gather data which they later use for identity theft. |
In some cases, the spyware may include key loggers that could lead to intellectual property theft and corporate espionage. |
The company has expanded the selection of grapples available to loggers with its new line of severe-duty grapples and new rotators. |
Key loggers can be on your system recording every keystroke and emailing it to an attacker, enemy or even your spouse. |
However, with the rise of phishing, key loggers and associated risks, I now see the true value of my little device! |
Hackers allegedly captured the code by using key loggers that they installed on company computers. |