The question that this white paper brings to light (and one that we indeed leave to the reader) is as follows: Is it preferable to adopt a general-purpose antikeylogger that works invisibly in many, if not most circumstances? Or is it best to take a granular, layered approach to malware protection and adopt a strategy that addresses all threats within a very narrow band of use, in this case the specific instances of Web form input?