A software, system and methodology for protecting against malware key
logger attacks that utilize, for example, form-grabbing techniques. The
application protects the browser from key logging malware attacks, and
the loss of critical user confidential information often entered into
internet forms for the purpose of buying items or logging into financial
institutions. An embodiment of a method for blocking form-grabbing
attacks includines the following steps. Upon detecting a form submission
event from the browser, and immediately after allowing the data to be
properly submitted, the form input fields are cleared of data. The method
prevents hook-based key loggers or form-grabbing key loggers from
capturing form input data, thereby protecting the user from theft of
passwords or credentials.