Security Vulnerabilities in Wireless Keyboards
Many wireless keyboards have a security vulnerability that allow someone to hack the computer using the keyboard-computer link. (Technical details here.) An attacker can launch the attack from up to...
View ArticleSecurity Vulnerabilities in Wireless Keyboards
Most of them are unencrypted, which makes them vulnerable to all sorts of attacks: On Tuesday Bastille’s research team revealed a new set of wireless keyboard attacks they’re calling Keysniffer. The...
View ArticleKeystroke Recognition from Wi-Fi Distortion
This is interesting research: “Keystroke Recognition Using WiFi Signals.” Basically, the user’s hand positions as they type distorts the Wi-Fi signal in predictable ways. Abstract: Keystroke privacy is...
View ArticleEavesdropping on Typing Over Voice-Over-IP
Interesting research: “Don’t Skype & Type! Acoustic Eavesdropping in Voice-Over-IP“: Abstract: Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior...
View ArticleKeylogger Found in HP Laptop Audio Drivers
This is a weird story: researchers have discovered that an audio driver installed in some HP laptops includes a keylogger, which records all keystrokes to a local file. There seems to be nothing...
View ArticleHacking a Phone Through a Replacement Touchscreen
Researchers demonstrated a really clever hack: they hid malware in a replacement smart phone screen. The idea is that you would naively bring your smart phone in for repair, and the repair shop would...
View ArticleGoogle's Data on Login Thefts
This is interesting research and data: With Google accounts as a case-study, we teamed up with the University of California, Berkeley to better understand how hijackers attempt to take over accounts in...
View ArticleMollitiam Industries is the Newest Cyberweapons Arms Manufacturer
Wired is reporting on a company called Mollitiam Industries: Marketing materials left exposed online by a third-party claim Mollitiam’s interception products, dubbed “Invisible Man” and “Night...
View ArticleLightning Cable with Embedded Eavesdropping
Normal-looking cables (USB-C, Lightning, and so on) that exfiltrate data over a wireless network. I blogged about a previous prototype here.
View ArticleWebsites that Collect Your Data as You Type
A surprising number of websites include JavaScript keyloggers that collect everything you type as you type it, not just when you submit a form. Researchers from KU Leuven, Radboud University, and...
View Article