Cyber criminals could crack keyboards

Computer criminals may soon be able to listen in and capture the electromagnetic signals produced on keyboards when specific keys are pressed.

Swiss...

Computer criminals may soon be able to listen in and capture the electromagnetic signals produced on keyboards when specific keys are pressed.

Swiss researchers have been able to analyse the signals generated by the keys and reveal what characters were pressed. The research was carried out at the Security and Cryptography Laboratory at the Swiss Ecole Polytechnique Federale de Lausanne (EPFL).

The security researchers have developed four different attacks that work on a wide variety of computer keyboards, reports the BBC.

As a result, the research students have declared that keyboards are "not safe to transmit sensitive information".

One attack was shown to work over a distance of 20metres. The researchers used a radio antenna to "fully or partially recover the keystrokes".

The students tested 11 different keyboard models that connected to a computer via a USB or a PS/2 socket. The attacks also worked with keyboards embedded in laptops.

If the research is carried over to the criminal fraternity, they would have an extra weapon to hack into keyboards, in addition to keylogging software that can be inadvertently downloaded by users from rogue websites.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close