1. IT-Security >
  2. Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say


IT Security vom | Direktlink: it.slashdot.org Nachrichten Bewertung

Reader Trailrunner7 writes: Researchers have known for a long time that acoustic signals from keyboards can be intercepted and used to spy on users, but those attacks rely on grabbing the electronic emanation from the keyboard. New research from the University of California Irvine shows that an attacker, who has not compromised a target's PC, can record the acoustic emanations of a victim's keystrokes and later reconstruct the text of what he typed, simply by listening over a VoIP connection. The researchers found that when connected to a target user on a Skype call, they could record the audio of the user's keystrokes. With a small amount of knowledge about the victim's typing style and the keyboard he's using, the researchers could accurately get 91.7 percent of keystrokes. The attack does not require any malware on the victim's machine and simply takes advantage of the way that VoIP software acquires acoustic emanations from the machine it's on.

Read more of this story at Slashdot.

...

https://it.slashdot.org/story/16/10/19/1549212/traditional-keyboard-sounds-can-be-decoded-by-listening-over-a-voip-connection-researchers-say?utm_source=rss1.0mainlinkanon&utm_medium=feed

Externe Webseite mit kompletten Inhalt öffnen

Kommentiere zu Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say






➤ Ähnliche Beiträge von Team IT Security

  • 1.

    P4wnP1 A.L.O.A. - Framework Which Turns A Rapsberry Pi Zero W Into A Flexible, Low-Cost Platform For Pentesting, Red Teaming And Physical Engagements

    vom 508.8 Punkte ic_school_black_18dp
    P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".0. How to installThe latest image could be fo
  • 2.

    Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say

    vom 415.14 Punkte ic_school_black_18dp
    Reader Trailrunner7 writes: Researchers have known for a long time that acoustic signals from keyboards can be intercepted and used to spy on users, but those attacks rely on grabbing the electronic emanation from the keyboard. New research from the University
  • 3.

    Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say

    vom 415.14 Punkte ic_school_black_18dp
    Reader Trailrunner7 writes: Researchers have known for a long time that acoustic signals from keyboards can be intercepted and used to spy on users, but those attacks rely on grabbing the electronic emanation from the keyboard. New research from the University
  • 4.

    Btlejack - Bluetooth Low Energy Swiss-army Knife

    vom 272.22 Punkte ic_school_black_18dp
    Btlejack provides everything you need to sniff, jam and hijack Bluetooth Low Energy devices. It relies on one or more BBC Micro:Bit. devices running a dedicated firmware. You may also want to use an Adafruit's Bluefruit LE sniffer or a nRF51822 Eval Kit
  • 5.

    Alternative input methods for Android TV

    vom 258.53 Punkte ic_school_black_18dp
    Posted by Benjamin Baxter, Developer Advocate and Bacon Connoisseur All TVs have the same problem with keyboard input: It is very cumbersome to hunt and peck for each letter using a D-pad with a remote. And if you make a mistake, trying to correct it compounds the problem. APIs like Smart Lock and Autofill, can ease user's frustrations, but for certain types of input, like login, you ne
  • 6.

    HiddenEye - Modern Phishing Tool With Advanced Functionality (Android-Support-Available)

    vom 236.02 Punkte ic_school_black_18dp
    Modern Phishing Tool With Advanced Functionality PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERING DEVELOPERS & CONTRIBUTORS ANONUD4Y (https://github.com/An0nUD4Y) USAMA ABDUL SATTAR (https://github.com/usa
  • 7.

    Ctrl+Alt+F[1-2-3-...] does not work

    vom 167.61 Punkte ic_school_black_18dp
    Here is what I have tried: $ xev KeyRelease event, serial 43, synthetic NO, window 0x4a00001, root 0x1db, subw 0x0, time 23449801, (434,-234), root:(1305,244), state 0x1c, keycode 67 (keysym 0x1008fe01, XF86Switch_VT_1), same_screen YES, XLookupStri
  • 8.

    Ctrl+Alt+F[1-2-3-...] does not work

    vom 167.61 Punkte ic_school_black_18dp
    Here is what I have tried: $ xev KeyRelease event, serial 43, synthetic NO, window 0x4a00001, root 0x1db, subw 0x0, time 23449801, (434,-234), root:(1305,244), state 0x1c, keycode 67 (keysym 0x1008fe01, XF86Switch_VT_1), same_screen YES, XLookupStri
  • 9.

    'Why the Amazon Basics Keyboard Is My Favorite Keyboard'

    vom 164.95 Punkte ic_school_black_18dp
    Full stack developer and teacher, Nick Janetakis, says the Amazon Basics keyboard is one of his favorite general purpose/programming keyboards. "It hits all the major points that make a keyboard good and it also happens to be only $14," he writes. From
  • 10.

    ASP.NET Core and Blazor updates in .NET Core 3.0 Preview 8

    vom 152.86 Punkte ic_school_black_18dp
    .NET Core 3.0 Preview 8 is now available and it includes a bunch of new updates to ASP.NET Core and Blazor. Here’s the list of what’s new in this preview: Project template updates Cleaned up top-level templates in Visual Studio Angular template updated to Angular 8 Blaz
  • 11.

    "Can I Take Over XYZ?" - A List Of Services And How To Claim (Sub)Domains With Dangling DNS Records

    vom 140.66 Punkte ic_school_black_18dp
    What is a subdomain takeover?Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows an attacker to set up a page on the
  • 12.

    DDE Downloaders, Excel Abuse, and a PowerShell Backdoor

    vom 140.51 Punkte ic_school_black_18dp
    DDE or Dynamic Data Exchange is a Microsoft protocol used to transmit data/messages between applications. This sounds harmless and useful, but can be weaponized and abused by malware authors. Microsoft blacklisted DDE last year for Word, but DDE is st