1. IT-Security >
  2. Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say

RSS Kategorie Pfeil IT Security vom | Quelle: it.slashdot.org Direktlink öffnen

Reader Trailrunner7 writes: Researchers have known for a long time that acoustic signals from keyboards can be intercepted and used to spy on users, but those attacks rely on grabbing the electronic emanation from the keyboard. New research from the University of California Irvine shows that an attacker, who has not compromised a target's PC, can record the acoustic emanations of a victim's keystrokes and later reconstruct the text of what he typed, simply by listening over a VoIP connection. The researchers found that when connected to a target user on a Skype call, they could record the audio of the user's keystrokes. With a small amount of knowledge about the victim's typing style and the keyboard he's using, the researchers could accurately get 91.7 percent of keystrokes. The attack does not require any malware on the victim's machine and simply takes advantage of the way that VoIP software acquires acoustic emanations from the machine it's on.

Read more of this story at Slashdot.

...

Webseite öffnen Komplette Webseite öffnen

Newsbewertung

Kommentiere zu Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say






Ähnliche Beiträge

  • 1. P4wnP1 A.L.O.A. - Framework Which Turns A Rapsberry Pi Zero W Into A Flexible, Low-Cost Platform For Pentesting, Red Teaming And Physical Engagements vom 490.89 Punkte ic_school_black_18dp
    P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".0. How to installThe latest image could be fou
  • 2. Traditional Keyboard Sounds Can be Decoded By Listening Over a VoIP Connection, Researchers Say vom 292.21 Punkte ic_school_black_18dp
    Reader Trailrunner7 writes: Researchers have known for a long time that acoustic signals from keyboards can be intercepted and used to spy on users, but those attacks rely on grabbing the electronic emanation from the keyboard. New research from the University
  • 3. Btlejack - Bluetooth Low Energy Swiss-army Knife vom 213.99 Punkte ic_school_black_18dp
    Btlejack provides everything you need to sniff, jam and hijack Bluetooth Low Energy devices. It relies on one or more BBC Micro:Bit. devices running a dedicated firmware. You may also want to use an Adafruit's Bluefruit LE sniffer or a nRF51822 Eval Kit,
  • 4. Alternative input methods for Android TV vom 212.71 Punkte ic_school_black_18dp
    Posted by Benjamin Baxter, Developer Advocate and Bacon Connoisseur All TVs have the same problem with keyboard input: It is very cumbersome to hunt and peck for each letter using a D-pad with a remote. And if you make a mistake, trying to correct it compounds the problem. APIs like Smart Lock and Autofill, can ease user's frustrations, but for certain types of input, like login, you nee
  • 5. HiddenEye - Modern Phishing Tool With Advanced Functionality (Android-Support-Available) vom 209.88 Punkte ic_school_black_18dp
    Modern Phishing Tool With Advanced Functionality PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERING DEVELOPERS & CONTRIBUTORS ANONUD4Y (https://github.com/An0nUD4Y) USAMA ABDUL SATTAR (https://github.com/usam
  • 6. Ctrl+Alt+F[1-2-3-...] does not work vom 169.71 Punkte ic_school_black_18dp
    Here is what I have tried: $ xev KeyRelease event, serial 43, synthetic NO, window 0x4a00001, root 0x1db, subw 0x0, time 23449801, (434,-234), root:(1305,244), state 0x1c, keycode 67 (keysym 0x1008fe01, XF86Switch_VT_1), same_screen YES, XLookupStrin
  • 7. Ctrl+Alt+F[1-2-3-...] does not work vom 169.71 Punkte ic_school_black_18dp
    Here is what I have tried: $ xev KeyRelease event, serial 43, synthetic NO, window 0x4a00001, root 0x1db, subw 0x0, time 23449801, (434,-234), root:(1305,244), state 0x1c, keycode 67 (keysym 0x1008fe01, XF86Switch_VT_1), same_screen YES, XLookupStrin
  • 8. 'Why the Amazon Basics Keyboard Is My Favorite Keyboard' vom 151.95 Punkte ic_school_black_18dp
    Full stack developer and teacher, Nick Janetakis, says the Amazon Basics keyboard is one of his favorite general purpose/programming keyboards. "It hits all the major points that make a keyboard good and it also happens to be only $14," he writes. From
  • 9. ASP.NET Core and Blazor updates in .NET Core 3.0 Preview 8 vom 119.11 Punkte ic_school_black_18dp
    .NET Core 3.0 Preview 8 is now available and it includes a bunch of new updates to ASP.NET Core and Blazor. Here’s the list of what’s new in this preview: Project template updates Cleaned up top-level templates in Visual Studio Angular template updated to Angular 8 Blazo
  • 10. "Can I Take Over XYZ?" - A List Of Services And How To Claim (Sub)Domains With Dangling DNS Records. vom 111.92 Punkte ic_school_black_18dp
    What is a subdomain takeover?Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows an attacker to set up a page on the s
  • 11. "Can I Take Over XYZ?" - A List Of Services And How To Claim (Sub)Domains With Dangling DNS Records vom 111.92 Punkte ic_school_black_18dp
    What is a subdomain takeover?Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows an attacker to set up a page on the s
  • 12. "Can I Take Over XYZ?" - A List Of Services And How To Claim (Sub)Domains With Dangling DNS Records vom 111.92 Punkte ic_school_black_18dp
    What is a subdomain takeover?Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows an attacker to set up a page on the s