And, if the attacker has administrative access on your computer, they can
install keyloggers, watch everything you're doing, steal all your data, and perform many other nasty attacks.
Easier approaches, he said, include an order to extract them from the server or network when the user logs in — which has been done before — or
installing a keylogger at the client.
Criminals could get into your system covertly and then
install a keylogger program that sends all your activity back to them.
But keep in mind, a more sophisticated hacker may have
installed a keylogger to capture passwords and other personal information entered on a public computer.
For example, you could
install a keylogger on a Chromebook using your developer mode access and then pass it along to someone.
Not exact matches
If a website uses a security flaw in your browser or a plug - in like Flash to compromise your computer, it will often attempt to
install malware —
keyloggers, Trojans, rootkits, and all sorts of other bad things.
The company or the person you bought it from could have
installed applications that you may not use, some of which might not be legitimate software, and you don't know if the device is infected with any malware like virus, Trojan, spyware, adware,
keylogger, or other malicious programs.
The attacker is manipulating bugs in software to gain access and gather private information, perhaps with a
keylogger they
install.