7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

Image by Thinkstock
Using a telephoto lens from up to 200-feet or a smartphone up close, attackers can turn a clear pic of a master key or high-security key into easy enterprise access, using a 3D printer to create the duplicate. With special software code like what two MIT students created for DefCon 21, criminal hackers can ensure that the necessary key measurements make it from the photo to the new key.
To read this article in full or to leave a comment, please click here
Story added 31. March 2017, content source with full text you can find at link above.
More antivirus and malware news?
- DARPA seeks to develop program that drastically improves DDoS defense
- Microsoft Patch Tuesday: Critical Spoofing and Remote Code Execution Flaws
- Attackers used known exploit to steal customer log-in credentials, vBulletin maker says
- Siemens Releases Several Advisories for Vulnerabilities in Third-Party Components
- It’s National Cyber Security Awareness Month
- More regulations necessary for APAC cybersecurity
- Hacker Group Disrupts Video Game Service in DDoS Attack
- Planned vSphere Upgrade for VM Hosting Service
- Former Cisco Employee Sentenced to Prison for Webex Hack
- EU Takes Step Toward Cyberattack Sanctions