Below, a list of stories and breaches, implicating keylogging spyware.
Also a video, “ EndpointLock. How It Works?”
EndpointLock™ Keystroke Encryption Software
The missing link in endpoint security. Studies now show that over 90% of enterprise breaches begin with a successful phishing attack to an endpoint, followed by the installation of spyware, specifically a keylogger.