Atypical Ways of How Your Data Can Be Stolen

A reader of the recent blog post titled “Are Wireless Keyboards Secure?” shared this article with me that I clipped for you to see.  It is fascinating to see what lengths a determined person could go to steal your data. It is using atypical methods of hacking that we would never dream of.  For example your own webcam, using special software, could be used against you to record and analyze your keystroke motions without you even being aware of it.  This all may sound like James Bond material; but hey, someone out there came up with these methods of intrusion and posted it on the internet for all to see.

webclip A “What’s On My PC…” Web Clip!


Sciam - cover

How Hackers Can Steal Secrets from Reflections

Information thieves can now go around encryption, networks and the operating system

By W. Wayt Gibbs

Key Concepts

Even with the best network security, your electronic data may not be safe from a determined hacker.

Researchers have extracted information from nothing more than the reflection of a computer monitor off an eyeball or the sounds emanating from a printer.

These attacks are difficult to defend against and impossible to trace.

I encourage you to read this article at “Scientific American”.


jaanix post to jaanix

Bookmark and Share


6 thoughts on “Atypical Ways of How Your Data Can Be Stolen

Add yours

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Powered by

Up ↑

%d bloggers like this: