A keylogging program logs the keypresses on a device. Fraudsters covertly download these onto devices through various methods, and then read the keys recorded in order to discover things like the victim’s passwords or bank details.

Keystroke Dynamics

Keystroke dynamics or typing dynamics refers to the automated method of identifying or confirming the identity of an individual based on the manner and the rhythm of typing on a keyboard. Keystroke dynamics is a behavioral biometric, which means that the biometric factor is 'something you do'.

Keystroke Logger

A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Keylogger software is also available for use on smartphones, such as Apple's iPhone and Android devices. Keyloggers are often used as a spyware tool by cybercriminals to steal personally identifiable information (PII), login credentials and sensitive enterprise data.


A kickback is an illegal payment intended as compensation for favorable treatment or other improper services. The kickback may be money, a gift, credit, or anything of value. Paying or receiving kickbacks is a corrupt practice that interferes with an employee's or a public official’s ability to make unbiased decisions. It is often referred to as a bribe.

KYC (Know Your Customer)

Know Your Customer (KYC) refers to due diligence that banks and other financial institutions must perform on their customers before doing business with them. Know your customer policies are usually required by governments and enforced by bank regulators to prevent corruption, identity theft, financial fraud, money laundering and terrorism financing. Most Know Your Customer frameworks are based on four components: 1) customer identification, 2) customer acceptance, 3) transaction monitoring and 4) ongoing risk management. Requirements vary by country, but the collection of basic identity documents, comparison against certain name lists ('politically exposed persons' or PEP lists, for example), and analysis of transaction behaviors are most common.