Comment Re:CopyPaste (Score 1) 388
Which of course doesn't work against a close relation of keystroke logging that simply records the GET and POST requests passed by the browser, and passes those to the bad guys.
These are at least as common as keystroke loggers these days (e.g., malicious BHOs for IE).
These are at least as common as keystroke loggers these days (e.g., malicious BHOs for IE).