Key loggers have been posing a threat to the confidentiality of sensitive information such as passwords, credit card numbers etc. Key loggers are very difficult to identify as they either work in stealth mode or pose themselves as legitimate programs to the system. There are several techniques for overcoming the menace of key loggers, but none is sufficient on their own. There needs to be a combination of several techniques to effectively eliminate the problem. The authors examine various techniques for detection of key logger attacks and concentrate upon the password input isolation using hypervisor in order to mitigate their effect as much as possible.