Not only does it log your keystrokes, but it can also discern other personally identifiable information by, for example, using web tools to retrieve your geolocation. Once the malware has stolen ...
As with earlier versions of the malware, once this software nasty gets onto a ... Then it gets to work logging keystrokes and performing other nefarious activities. It uses the SetWindowsHookEx ...