Malicious software can be used to monitor use of personal computing devices. For example, keylogging tools record every keystroke you make on your computer