Check your processes in the task manager to see what's running. Terminate those that you think might be the culprit.
Business.com on MSN

What is keystroke logging?

There is more than one way to monitor your employees' actions during the workday. Is keystroke logging a viable option for ...
Sensitive business information stored on a computer is vulnerable, especially when a keystroke logger program is involved. Once it's installed, a keystroke logger maintains a record of every key typed ...
Cyber security researchers have developed a new attack called "Malboard." Malboard evades several detection products that are intended to continuously verify the user's identity based on personalized ...