How does the Managed Browser Service protect against keystroke loggers?
Some keystroke loggers are implemented using browser malware, others using desktop Trojans. A third class of keystroke loggers is implemented by means of a physical device, or dongle, that is surreptitiously attached to the target device and harvests login credentials entered via its keyboard. None of these methods is capable of accessing and stealing the device ID, which is never typed or otherwise visible on the deviceʼs I/O channels.