Traditionally, keyloggers were either software that needed to be installed on the target computer or devices that were connected to the target computer. With the advent of wireless keyboards and due to their popularity, keyloggers no longer have to be installed or attached to the target computers.
Wireless keyboards do nothing at all or very little to secure key click transmissions to the computer that they are connected to. They are usually effective within about 30 feet radius. Anyone within the signal radius can receive the key strokes and process them. Now, remote-exploit.org has created a small device that can receive key strokes and log them.
This device is called Keykeriki and is designed to be small. It is also opensource. So anyone can put this device together. While this is currently not sold as a pre-fabricated board, that is also in the roadmap, which has the potential of making this a very popular device.
Consider this scenario. You are in your home office and logging into your bank account using your computer that has a wireless keyboard. Someone is outside your window (or has dropped this device there) and logging your credentials. Or you are making a purchase and typing in your credit card and CVV number. Someone is getting all this information.
Another scenario is if someone slips this device into their laptop bag and brings it to work. They can potentially log all the keystrokes from all the people in neighboring cubicles. That is a scary scenario even without mentioning trade secrets and legally protected data. This has the potential to cause huge problems.
Enterprises will need to consider keyboards when looking at security and also educate employees on the risks. For some reason, as we try to make things simpler and easier, it always seems to make them more complex and difficult.