Atypical Ways of How Your Data Can Be Stolen

A reader of the recent blog post titled “Are Wireless Keyboards Secure?” shared this article with me that I clipped for you to see.  It is fascinating to see what lengths a determined person could go to steal your data. It is using atypical methods of hacking that we would never dream of.  For example your own webcam, using special software, could be used against you to record and analyze your keystroke motions without you even being aware of it.  This all may sound like James Bond material; but hey, someone out there came up with these methods of intrusion and posted it on the internet for all to see.

webclip A “What’s On My PC…” Web Clip!

[SOURCE: www.scientificamerican.com]

Sciam - cover


How Hackers Can Steal Secrets from Reflections


Information thieves can now go around encryption, networks and the operating system


By W. Wayt Gibbs


Key Concepts

Even with the best network security, your electronic data may not be safe from a determined hacker.


Researchers have extracted information from nothing more than the reflection of a computer monitor off an eyeball or the sounds emanating from a printer.


These attacks are difficult to defend against and impossible to trace.

I encourage you to read this article at “Scientific American”.


StumbleIt

jaanix post to jaanix

Bookmark and Share

[ CLICK HERE TO LEAVE A COMMENT ]

6 thoughts on “Atypical Ways of How Your Data Can Be Stolen

Add yours

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Powered by WordPress.com.

Up ↑

%d bloggers like this: