Hackers can steal data by monitoring the brightness of the pc screen

A recent study revealed that hackers could steal your data simply by monitoring the brightness of your computer screen.

hackers

There are a bunch of ways to from computers, without the requirement of a network connection or without the need for hackers to be in front of your computer. Such examples have been reported through of speakersthrough of the fan, through the led of your hard drive, and a bunch of imaginative scenarios.

Such clever hacking is also through the brightness of the screen. Researchers have found a way to steal data from computers remotely, without connection to the network or other devices, using the brightness of the LCD screen.

This approach lies in subtle changes in the RGB color values ​​of the LCD screen, but which can be detected by a device equipped with a camera. Hackers could, in theory, trick you into loading one software at you and then use nearby security cameras to read that information.

If you've already got up and are looking out the window for cameras aiming at you, calm down. According to research, hackers, in addition to breaking into your computer, should also break into a camera that has direct visual contact with your screen.

Σαν σενάριο προφανώς δεν ανταποκρίνεται στους απλούς χρήστες, αλλά θα μπορούσε κάλλιστα να εφαρμοστεί σε ιδιαίτερα ασφαλείς υπολογιστές που τα δεδομένα τους έχουν αρκετή . Like for government or industrial espionage. If you are a business person and your competition is very large and fiercely aggressive, then seriously consider removing the cameras that view your computer screens.

See the relevant video below:

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).