Friday, March 27, 2009

Simple keystroke sniffing schemes work where keyloggers won't

Source: http://www.engadget.com/2009/03/27/simple-keystroke-sniffing-schemes-work-where-keyloggers-wont/


Ah, the wonders of CanSecWest. The famed security conference has delivered yet again in 2009, this time bringing to light two simple sniffing schemes that could be used to decipher typed text when keyloggers are just too noticeable. Gurus from Inverse Path were on hand to explain the approaches, one of which involved around $80 of off-the-shelf gear. In short, curious individuals could point a laser on the reflective surface of a laptop between 50 feet and 100 feet away, and then by using a "handmade laser microphone device and a photo diode to measure the vibrations, software for analyzing the spectrograms of frequencies from different keystrokes, as well as technology to apply the data to a dictionary," words could be pretty easily guessed. The second method taps into power grid signals passed along from PS/2 keyboard outputs, and by using a digital oscilloscope and an analog-digital converter, those in the know can pick out tweets from afar. Check the read link for more, and make sure you close those blinds and pick up a USB keyboard, pronto.

[Via Slashdot]

Filed under: ,

Simple keystroke sniffing schemes work where keyloggers won't originally appeared on Engadget on Fri, 27 Mar 2009 09:01:00 EST. Please see our terms for use of feeds.

Read | Permalink | Email this | Comments