A reader of the recent blog post titled “Are Wireless Keyboards Secure?” shared this article with me that I clipped for you to see. It is fascinating to see what lengths a determined person could go to steal your data. It is using atypical methods of hacking that we would never dream of. For example your own webcam, using special software, could be used against you to record and analyze your keystroke motions without you even being aware of it. This all may sound like James Bond material; but hey, someone out there came up with these methods of intrusion and posted it on the internet for all to see.
A “What’s On My PC…” Web Clip!
How Hackers Can Steal Secrets from Reflections
Information thieves can now go around encryption, networks and the operating system
Even with the best network security, your electronic data may not be safe from a determined hacker.
Researchers have extracted information from nothing more than the reflection of a computer monitor off an eyeball or the sounds emanating from a printer.
These attacks are difficult to defend against and impossible to trace.
I encourage you to read this article at “Scientific American”.