Though this might be a older post as the technology may be old as well but I got hold of this interesting article when I was looking at the ATM urgency article.
What if the password of your bank site is being hacked or gmail is hacked? Or any other password protected site you have used for all your personal purposes being hacked?
There could be several possibilities on how it could be hacked but still one common mistake where everyone of us may do time and again is using cyber cafe in case of urgencies. Look at the backside of the PC is what is suggested
Keyboard logging technique is one such technique where you end up awarding your secrecy without you are being aware of. Still NOT able to figure it out? proceed to see how..
As provided in the above images, the extra protruding hardware on the back of the computer you may use in the cyber cafe is called "Keyboard logger". With this plugged in, each of your key board activities are being recorded somewhere so that it could be retrieved to emulate the same operation that you performed anytime.
Here is the before and after effects on a PC:
Imagine if such an activity is being logged when you try to access your favourite banking site. It is like presenting a gift card to the owner of this hacking device owner.
So next time, when you enter into a cyber cafe, please ensure that there are NO extra protrusions on the PCs that you use.
Relieved from Shocker? no. not yet!! The bad news is that Keyboard logger softwares are also being available in the market. With those usages, you will NEVER be able to confirm its persence from the PC's physical.
How do you overcome them? Any idea??!!!
What if the password of your bank site is being hacked or gmail is hacked? Or any other password protected site you have used for all your personal purposes being hacked?
There could be several possibilities on how it could be hacked but still one common mistake where everyone of us may do time and again is using cyber cafe in case of urgencies. Look at the backside of the PC is what is suggested
Keyboard logging technique is one such technique where you end up awarding your secrecy without you are being aware of. Still NOT able to figure it out? proceed to see how..
As provided in the above images, the extra protruding hardware on the back of the computer you may use in the cyber cafe is called "Keyboard logger". With this plugged in, each of your key board activities are being recorded somewhere so that it could be retrieved to emulate the same operation that you performed anytime.
Here is the before and after effects on a PC:
Imagine if such an activity is being logged when you try to access your favourite banking site. It is like presenting a gift card to the owner of this hacking device owner.
So next time, when you enter into a cyber cafe, please ensure that there are NO extra protrusions on the PCs that you use.
Relieved from Shocker? no. not yet!! The bad news is that Keyboard logger softwares are also being available in the market. With those usages, you will NEVER be able to confirm its persence from the PC's physical.
How do you overcome them? Any idea??!!!
0 comments:
Post a Comment
Please let me know your inputs/feedback on this blog post: