Hackers devise method to take over wireless keyboards/mouses


Genesis cover

On Christmas Eve 1968 three Americans became the first humans to visit another world. What they did to celebrate was unexpected and profound, and will be remembered throughout all human history. Genesis: the Story of Apollo 8, Robert Zimmerman's classic history of humanity's first journey to another world, tells that story, and it is now available as both an ebook and an audiobook, both with a foreword by Valerie Anders and a new introduction by Robert Zimmerman.

 
The ebook is available everywhere for $5.99 (before discount) at amazon, or direct from my ebook publisher, ebookit.

 
The audiobook is also available at all these vendors, and is also free with a 30-day trial membership to Audible.
 

"Not simply about one mission, [Genesis] is also the history of America's quest for the moon... Zimmerman has done a masterful job of tying disparate events together into a solid account of one of America's greatest human triumphs." --San Antonio Express-News

Your modern wireless computer is not safe: Hackers have devised an attack that is capable of not only recording the keystrokes and mouse actions of wireless devices, it can also take over the computer, and it can do it from hundreds of feet away.

On Tuesday Bastille’s research team revealed a new set of wireless keyboard attacks they’re calling Keysniffer. The technique, which they’re planning to detail at the Defcon hacker conference in two weeks, allows any hacker with a $12 radio device to intercept the connection between any of eight wireless keyboards and a computer from 250 feet away. What’s more, it gives the hacker the ability to both type keystrokes on the victim machine and silently record the target’s typing.

The keyboards’ vulnerability, according to Bastille’s chief research officer Ivan O’Sullivan, comes from the fact that they all transmit keystrokes entirely without encryption. The manufacturers’ only plan against attackers spoofing or eavesdropping on their devices’ communications is to depend on the obscurity of the radio protocols used. “We were stunned,” says O’Sullivan. “We had no expectation that in 2016 these companies would be selling keyboards with no encryption.”

In other words, if you use a wireless keyboard or mouse, your system is very vulnerable and exposed.

I find this story amusing in a sense, since my friends constantly make fun of me for not upgrading to these devises. I however see no reason to spend money on a new keyboard when the old wired one I have works fine. Now I have good reason, when I do upgrade, to avoid the wireless route.

Readers!
 

We are now in the third week of my annual July fund-raiser for Behind the Black. My deep thanks to everyone who has so far donated or subscribed. The response this year has been wonderful.
 

We are not done yet. This monthly fund-raiser is now half over, and I am hoping the second half will result in as many donations as the first half did. If it does, I will remain free to continue my writing as I see fit, unblemished by the efforts of others to squelch my perspective in this increasingly intolerant world.
 

This year's fund-raising drive is also significant in that it celebrates the 10th anniversary of this website's founding. It is hard to believe, but I have been doing this for a full decade, during which I have written more than 22,000 posts, of which more than 1,000 were essays and almost 2,600 were evening pauses.
 

Therefore, I hope you will please consider donating to Behind the Black, by giving either a one-time contribution or a regular subscription, as outlined in the tip jar below. Your support will allow me to continue covering science and culture as I have for the past twenty years, independent and free from any outside influence.


 

Regular readers can support Behind The Black with a contribution via paypal:

Or with a subscription with regular donations from your Paypal or credit card account:


 

If Paypal doesn't work for you, you can support Behind The Black directly by sending your donation by check, payable to Robert Zimmerman, to
 
Behind The Black
c/o Robert Zimmerman
P.O.Box 1262
Cortaro, AZ 85652

2 comments

  • wodun

    Having to replace batteries is another good reason. Also, under a heavy CPU load, your wireless performance might suffer.

  • Nick

    This has been known in the intelligence community for at least 10-15 years (I forget exactly when I received my computer security briefing when I was at one of the National Labs – but it was at least in that range). Anyone with the right equipment could always sniff your keyboard, mouse, and even monitor. That’s why there are things called “scif’s” where those of us who had the privilege of working on classified material could protect it. Unlike the evil that is Shrillary, who didn’t give a hoot.

Leave a Reply

Your email address will not be published. Required fields are marked *