


The traditional keylogger is a hardware device that intercepts data between the the keyboard and the intake of character data at the Keyboard Controller (mostly USB Device, HID Keyboard).
HOW TO DETECT A KEYLOGGER ON MAC OS X PASSWORD
Is there any way to (partially) defeat keylogger attacks against system-level password entry on OS X? (Either a replaced keyboard with the logger hidden inside, or something attached on its' USB cord.) Tl dr: Is there any way to (partially) defeat keylogger attacks against system-level password entry on OS X?Įdit: Because I'm not here to discuss the feasibility of keyloggers on OS X, let's presume I'm talking about defending against a physical keylogger being injected into my keyboard's data pipeline. In other secure systems I use, there's an option to enter a final part of the password using the mouse or similar, to help avoid keyloggers making an attacker's job too difficult. I'm (perhaps unreasonably) afraid of keyloggers, as these are the only method I can think of short of a system-level vulnerability or physically watching (or recording) my activities when entering the password. There's several places in my ‘personal security infrastructure’ (is there a better phrase for that?) where I find myself typing very important passwords into text-fields on OS X (for instance, dis-encrypting and mounting thumbdrives containing very sensitive data.)
