Keystroke Loggers (or Key loggers) intercept the Target’s keystrokes and either saves them in a file to be read later, or transmit them to a predetermined destination accessible to the Hacker.
Since Keystroke logging programs record every keystroke typed in via the keyboard, they can capture a wide variety of confidential information, including passwords, credit card numbers, and private Email correspondence, names, addresses, and phone numbers.