There’s never a shortage of security holes
Information security is a job that can never be completed. Threats multiply, and new vectors of attack become apparent. A couple of new ones were publicized in last week.
For starters, internet security company Bastille advised that thieves can access a wireless keyboard’s “unencrypted radio communication protocols, enabling an attacker to eavesdrop on all the keystrokes typed by the victim from several hundred feet away using less than $100 of equipment. Wireless keyboards commonly communicate using proprietary protocols operating in the 2.4GHz ISM band. In contrast to Bluetooth, there is no industry standard to follow, leaving each vendor to implement their own security scheme.”
To read this article in full or to leave a comment, please click here
Read more: There’s never a shortage of security holes