You might have read a lot of news on cyber crimes like online identity theft, internet banking robbery, etc. Have you ever thought about how they do it? Most of the credential stealing cyber crimes are done using keyloggers. If the term is new, you must read this all-about-keylogger post thoroughly. What is a Keylogger? […]