【Tags】
In November,Tags a computer programmer spotted some strange code while trying to control a backlit keyboard on a Hewlett-Packard laptop.
It was a keylogger -- which if turned on by a hacker is capable of monitoring every keystroke you type and save this activity to a file. It's a common hacking technique used to steal passwords, as Google recently noted in its year-long study on computer security.
SEE ALSO: Florida man hacked Uber in 2016In this case, the code was not turned on, but TechCrunch nonetheless reported on programmer Michael Myng's blog post about finding the deactivated keylogger. In his memo, Myng wrote that he notified HP of the presence of the keylogger's presence.
So, I messaged HP about the finding. They replied terrificly fast, confirmed the presence of the keylogger (which actually was a debug trace) and released an update that removes the trace.
Myng calls this piece of code a "debug trace," a tool commonly used by software companies to "trace" a problem or bug, suggesting this code wasn't put there with any malicious intent -- either by HP or anyone else.
For HP users that want to rid their computers of this keylogger -- should a hacker gain physical access to their computer and turn it on -- HP's fix (issued on Nov. 7) can be found on their site here, along with an extremely long list of affected models.
In their fix, HP notes that a "potential security vulnerability has been identified" and HP has no "access to customer data as a result of this issue."
Mashable contacted HP for comment and will update this post upon hearing back.
Featured Video For You
The most difficult kind of computer systems to hack
Topics Cybersecurity HP
Search
Categories
Latest Posts
Samsung Unpacked stream is set for May 12, 2025
2025-06-26 06:37Netflix debunked that distressing rumor about 'Stranger Things'
2025-06-26 06:22'Black Panther' hype and success shows importance of representation
2025-06-26 05:18The Mismeasure of Media
2025-06-26 05:16Popular Posts
A worthless juicer and a Gipper-branded server
2025-06-26 07:01Report: New Amazon Go stores to open in Seattle, Los Angeles
2025-06-26 04:57Whale Vomit Episode 5: Startup Monarchy
2025-06-26 04:35Featured Posts
Your 'wrong person' texts may be linked to Myanmar warlord
2025-06-26 07:08Bigelow's inflatable space capsules may replace the Space Station
2025-06-26 06:50Bitcoin Regret Club shows what you could have if you invested early
2025-06-26 06:27Will Smith shares inspiring message with 'Black Panther' cast
2025-06-26 05:45The 10 Most Anticipated PC Games of 2016
2025-06-26 04:37Popular Articles
The best day to book your flight, according to Google
2025-06-26 06:44This addictive online game lets you build your own fake news empire
2025-06-26 06:00'Black Panther' director Ryan Coogler tweets heartfelt note to fans
2025-06-26 05:01Ted Cruz has made a very serious enemy out of 'Simpsons' fans
2025-06-26 04:54Philips now allows customers to 3D print replacement parts
2025-06-26 04:37Newsletter
Subscribe to our newsletter for the latest updates.
Comments (42185)
New Knowledge Information Network
A worthless juicer and a Gipper-branded server
2025-06-26 07:04Progress Information Network
Shuri would be so proud of all of your 'Black Panther' memes
2025-06-26 06:42Interesting Information Network
Tesla cloud account hacked to mine cryptocurrency
2025-06-26 06:02Palm Information Network
Turn your smartphone camera into a microscope with this 3D
2025-06-26 05:55Exquisite Information Network
The Sound and the “Furious”
2025-06-26 04:52