Every keystroke you make on some wireless keyboards can be spied on by hackers lurking nearby, according to research released by cybersecurity firm Bastille. The "vast majority" of low-cost wireless keyboards are vulnerable to an attack researchers have dubbed "KeySniffer," according to the company.
Hackers can easily steal sensitive info with an antenna. Billions have been spent to research and build systems to protect today's tech users from hackers. But internet security, like anything else, is only as strong as its weakest link. One of those weak links appears to be wireless keyboards.
You know those wireless keyboards that some of you might herald as the next best thing due to its wireless connectivity? Turns out that there are some of them that aren’t as secure as they could be, which means that you as a user could be compromised if hackers were to figure out the vulnerabilities.
Tens of millions of wireless keyboards and mice are in use worldwide, but a hacking tool called KeySniffer can identify the keystrokes of wireless keyboards from at least eight companies. The security flaws could enable a determined attacker to sniff passwords and other sensitive information from the devices.
Every keystroke you make on some wireless keyboards can be spied on by hackers lurking nearby, according to research released Tuesday by the cybersecurity firm Bastille. The "vast majority" of low-cost wireless keyboards are vulnerable to an attack that researchers have dubbed "KeySniffer," according to the company.
At first glance, a new hacking technique looks pretty scary. Using an attack that researchers at cybersecurity firm Bastille are calling "KeySniffer," hackers can detect every key you press on your wireless keyboard.
A newly discovered set of wireless keyboard vulnerabilities can let hackers take over your keyboard and secretly record what you type. It’s called KeySniffer, and it spells death for millions of wireless, radio-based keyboards.
Your wireless keyboard is giving up your secrets - literally.
With an antenna and wireless dongle worth a few bucks, and a few lines of Python code, a hacker can passively and covertly record everything you type on your wireless keyboard from hundreds of feet away. Usernames, passwords, credit card data, your manuscript or company's balance sheet -- whatever you're working on at the time.
Just months after uncovering MouseJack, Atlanta-based cybersecurity company Bastille recently uncovered vulnerabilities that could leave consumers open to attack when using a low-cost wireless keyboard. Hackers are reportedly utilizing a set of security vulnerabilities the company calls “KeySniffer,” which can enable them to remotely capture all keystrokes from up to 250 feet away.
Wireless keyboards from several vendors don’t use encryption when communicating with their USB dongle, allowing remote attackers to intercept keystrokes or send their own commands to the targeted computer.
Bastille researchers spotted a "KeySniffer" vulnerability affecting wireless keyboards from at least eight manufacturers, that could allow an attacker to eavesdrop and record a victim's keystrokes from hundreds of feet away.
Wireless mice and keyboards are the perfect accessories for a world in which devices increasingly are shuffling off their connection coils, but those accessories -- especially untethered rodents -- also can create new threats for those who use them.