However, when set up for malicious needs, keyloggers can be used to steal password information, banking facts as well as other sensitive data. Keyloggers could be inserted into a program by way of phishing, social engineering or malicious downloads.Mock phishing e-mails are despatched to described groups to assess phishing fraud vulnerability stage