How Hackers Can Steal Secrets from Reflections


The reflection of screen images is only one of the many ways in which our computers may leak information through so-called side channels, security holes that bypass the normal encryption and operating-system restrictions we rely on to protect sensitive data. Researchers recently demonstrated five different ways to surreptitiously capture keystrokes, for example, without installing any software on the target computer.

Full article by W. Wayt Gibbs on Scientific American

0 comments:

 


NAACAL - Templates Novo Blogger 2008