Hackers can steal data by monitoring the brightness of the pc screen

A recent investigation revealed that hackers could steal them you by simply monitoring the brightness of your computer screen.

hackers

There are a number of ways to collect data from computers without the need for a network connection or without the need for hackers to be in front of your computer. Such examples have been reported through of speakersthrough of the fan, through the led of your hard drive, and a bunch of imaginative scenarios.

Such clever hacking is also through the brightness of the screen. Researchers have found a way to steal data from computers remotely, without connection to the network or other devices, using the brightness of the LCD screen.

This approach lies in subtle changes in the RGB color values ​​of the LCD screen, but which can be detected by a device equipped with a camera. Hackers could, in theory, trick you into loading some malware onto your system and then use nearby security cameras to read those .

If you've already got up and are looking out the window for cameras aiming at you, calm down. According to research, hackers, in addition to breaking into your computer, should also break into a camera that has direct visual contact with your screen.

As a scenario it is obviously not suitable for ordinary users, but it could well be applied to highly secure computers whose data is quite important. Like for state or bio espionage. If you are a business person and your competition is very large and fiercely aggressive, then seriously consider removing the cameras that view your computer screens.

See the relevant video below:

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.080 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).