{"id":83,"date":"2005-11-24T20:10:59","date_gmt":"2005-11-25T01:10:59","guid":{"rendered":"http:\/\/www.skipease.com\/blog\/privacy-identity-theft\/spyware-programs-that-can-listen-to-and-record-your-keystrokes\/"},"modified":"2016-06-22T06:06:27","modified_gmt":"2016-06-22T11:06:27","slug":"spyware-programs-that-can-listen-to-and-record-your-keystrokes","status":"publish","type":"post","link":"https:\/\/www.skipease.com\/blog\/privacy-identity-theft\/spyware-programs-that-can-listen-to-and-record-your-keystrokes\/","title":{"rendered":"Spyware Programs That Can Listen To and Record Your Keystrokes"},"content":{"rendered":"<p><a title=\"Permanent Link: Keystroke logger of the worst kind: a microphone\" href=\"http:\/\/blogs.zdnet.com\/BTL\/?p=1893\" rel=\"bookmark\"> Keystroke logger of the worst kind: a microphone<\/a> by <a href=\"http:\/\/zdnet.com\">ZDNet<\/a>&#8216;s David Berlind &#8212; Just when you thought anti-spyware technology was making it safe to compute again, researchers at the University of California have come up with a new form of spyware using some old technology: a microphone.\u00a0 According to a story on ScientificAmerican.com, with 88 percent accuracy (after certain algorithms were applied), the researchers &#8220;successfully decoded what was [&#8230;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keystroke logger of the worst kind: a microphone by ZDNet&#8216;s David Berlind &#8212; Just when you thought anti-spyware technology was making it safe to compute again, researchers at the University of California have come up with a new form of spyware using some old technology: a microphone.\u00a0 According to a story on ScientificAmerican.com, with 88 [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/www.skipease.com\/blog\/privacy-identity-theft\/spyware-programs-that-can-listen-to-and-record-your-keystrokes\/\">Read More&#8230;<span class=\"screen-reader-text\"> from Spyware Programs That Can Listen To and Record Your Keystrokes<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-83","post","type-post","status-publish","format-standard","hentry","category-privacy-identity-theft"],"_links":{"self":[{"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/posts\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/comments?post=83"}],"version-history":[{"count":1,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/posts\/83\/revisions"}],"predecessor-version":[{"id":6649,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/posts\/83\/revisions\/6649"}],"wp:attachment":[{"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/media?parent=83"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/categories?post=83"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skipease.com\/blog\/wp-json\/wp\/v2\/tags?post=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}