In relationship? Your techie partner could be secretly monitoring your phone, computer

Using a keylogger, your partner can read your email, instant messages and transactions.

While keyloggers are widely used by hackers to steal personal information and bank card details, this technology has been used by some people in a relationship to keep tabs on the activities of their partners.

For the uninitiated, a keylogger is a type of surveillance software capable of recording every keystroke a person makes to a log file, usually encrypted. This helps in mining all information, such as instant messages, URLs and emails, and send them to a specified server.

Also read: Newly discovered iOS feature shows how much time you spend on apps

There are a lot of mechanisms that a keylogger is installed on a smartphone or computer. According to security software company AVG, keyloggers are malware or malicious software, which is used by cyber criminals.

By nature, it launches suspicious links, hides under sketchy email attachments or runs a nasty ad to get a grip of your banking details, passwords and everything that you type using a keyboard or keypad. And believe it or not, public machines or devices are in the first line of this vulnerability.

However, if you are in a relationship and your partner knows a bit about leveraging the power of technology, then he/she could be using it to remotely stare at your smartphone or computer.

When you log in your Facebook or email on a device with a keylogger installed in it, chances are your email and password have been recorded. Not to mention, your messages are also in danger.

Also read: Android apps view ads, watch videos without you knowing it

If you are so certain of your loyalty to your partner, then good for you. But if you are not sure if your partner has been monitoring your cyber activities all this time, you can always detect and remove the keylogger. You still need your own little space for privacy, don't you?

Antivirus software can take them down and destroy them for you. Above all, it is important to note not to provide any personal information when using a common or public computer or any device.