Your Keyboard : A lot of us loves fancy keyboard, some are developed by hackers and send sensitive information back to the developer. Some have low security that a virus can always steal information as you type them( i.e listening to all your input).
Some virus read data from your keyboard clip board (most people don't even know there is a clip board in there keyboard) .
Clip board is like a temporary note pad that stores the last 10 to (depends on the range) of copied data.
Always delete your private key from your keyboard's clip board .
That's why the earliest version of blockchain app doesn't allow you to copy information from it
Overlaying: You have to be careful the permission stupid apps ask. I always uninstall apps that ask for overlaying permission. They are transparent app that opens on other app. So when you think you are typing into your Normal, you are actually typing into an overlaying app and the overlaying will then type it into the normal app. That way, you won't know that's was a middle man theif.
Example of overlaying app is onscreen moving ant,
That's why the earliest version of blockchain app doesn't open when it detects an overlaying app.
Your Browser cookies on browser also like clip board. It's the way your browser remembers you have logged in before. It's suppose to be inaccessible by any other site except from the site that creates the cookie but some virus finds way to steal cookie and decrypt them. Some cookies themselves are virus programs.
Every time you open ED and your new is still imported, it's because ED stores your private key and public key on a cookie.
Always log out from sensitive site.
Best advice, open sensitive site in incognito mode, because incognito will destroy all cookie created the moment you close your browser Or have a separate browser for accesing sensitive site, don't use such browser for your day to day social stuffs.
thanks for the information sir. so what we do now are keep our antivirus up to date and that's have a malware scanner.
the hacker now using payload to put their exploit code on some file like pdf , doc and xls.
and if the virus success enter to our system, hacker can access all of our file include our webcam, keyboard and all over.
so be carefully