JacKz5o
New Member
- Joined
- Jan 22, 2007
- Messages
- 477 (0.07/day)
- Location
- New Jersey
Processor | Intel Q6600 @ 3.2GHz |
---|---|
Motherboard | XFX nForce 780i |
Cooling | Ultra 120 eXtreme (lapped) |
Memory | 4GB G.Skill PC2-8000 PQ |
Video Card(s) | eVGA GeForce 9800GTX |
Storage | 640GB + 250GB + 2x500GB (external) |
Display(s) | Samsung 216BW 21.6" |
Case | CoolerMaster Cosmos S |
Audio Device(s) | Creative X-Fi XtremeMusic |
Power Supply | PC Power & Cooling 750W Silencer |
Software | Windows Vista Ultimate 64-bit |
A new white-paper published by Remote Exploit highlights how it is possible to remotely intercept signals from wireless peripherals such as keyboards. The security hack works only against keyboards using radio technology operating on a radio frequency of 27Mhz, which was previously thought to be secure from most casual attacks. The white-paper demonstrates how it is possible to use a simple radio receiver, a sound card, and some basic PC software to intercept these signals and reveal what users have been typing. While Bluetooth is safe from this vulnerability, companies such as Microsoft and Logitech still continue to use the tradition radio technology.
View at TechPowerUp Main Site
View at TechPowerUp Main Site