Key logging software has been around for quite awhile. Companies use it to ‘virtually’ stand over the shoulders of employees and read every letter typed on their keyboards. But this software is also used by hackers to commit identity theft, as was the case with nefarious installations on the computer systems of major universities throughout… Continue Reading