HP keylogger: How did it get there and how can it be removed?

(Source: TechTarget) But even the most secure software development can enable security issues to slip through the cracks. When you add in an outsourced hardware or software …