anthony18
(Anthony384)
1
Just saw the news that some computers at a University campus had USB keyloggers on them. At first I though someone had installed a software but in this case, it was a physical USB device connected inline with the USB Keyboard. Interesting. Never thought about that. Think of all the POS systems and bank terminal that have exposed USB connections… Scary. Might be good to start a physical audit of your PCs that are publicly accessible. Simply locking down the OS is not enough to protect the pcs from being compromised.
9 Spice ups
michaelsc
(Michael.SC)
2
Even more concerning when you consider vulnerabilities with wireless keyboards. Security, the elusive dream!
I remember seeing these at least a decade ago. They connect between your keyboard and PC and record every keystroke. Simple enough to put on and remove when no one is around.
The first element of security is always physical.
5 Spice ups
anthony18
(Anthony384)
4
I believe there is encryption on wireless KBs. Many years ago, I read that you can actually capture text that appears on a CRT screen using some wireless device. Will try to find the article.
1 Spice up
Rivitir
(Rivitir)
5
Several years back a bank was compromised because the janitors installed PS/2 and USB key loggers on the helpdesk staff workstations. After that the bank started filling in and gluing all connections shut.
Physical keyloggers have been around a long time.
2 Spice ups
anthony18
(Anthony384)
6
Yeah guess I’m not always up to date with the latest vulnerabilities or hacking methods.
Rivitir
(Rivitir)
7
Read “The Cuckoo’s Egg” by cliff Stoll. In there he uses dot matrix printers as a make shift keylogger back in the 80’s. Realy good read.
http://www.amazon.com/gp/product/B0083DJXCM/
1 Spice up
jonahzona
(jonahzona)
8
A couple high school kids in our town got busted using one of those to get into the school SIS and change their grades.
Oh the youth of today…
2 Spice ups
physical devices have been around for a very long time. no surprise here
only surprise is the level of nefariuos individuals on the planet
1 Spice up
You can duplicate the display on a normal CRT from quite a distance. You simply need an antenna with sufficient gain and an idea of what frequencies are used to scan the beam. This was the impetus for the TEMPEST program that shields computer equipment from remote eavesdropping. Here’s the NSA’s explanation:
https://www.iad.gov/iad/programs/iad-initiatives/tempest.cfm
1 Spice up
rojoloco
(RojoLoco)
11
I’m no longer surprised by the actions of humans, we are the worst.
thats it, everyone goes back to pend and paper!
We’re also the best. And the only (as far as we know).
1 Spice up