7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

Image by Thinkstock
Using a telephoto lens from up to 200-feet or a smartphone up close, attackers can turn a clear pic of a master key or high-security key into easy enterprise access, using a 3D printer to create the duplicate. With special software code like what two MIT students created for DefCon 21, criminal hackers can ensure that the necessary key measurements make it from the photo to the new key.
To read this article in full or to leave a comment, please click here
Story added 31. March 2017, content source with full text you can find at link above.
More antivirus and malware news?
- At Microsoft Inspire, the new Edge browser took center stage
- Anatomy of a phish – a "generic mass targeted attack" against WordPress admins
- US Government Agencies Issue Guidance on Threats to 5G Network Slicing
- Japan to Survey 200 Million Gadgets for Cyber Security
- ITS Streaming Services will be unavailable on 1/15/2014 during maintenance window
- Google Helps G Suite Admins Enforce Strong Passwords
- Russian Authorities Arrest Head of International Cybercrime Group
- Fake Plants vs Zombies and other Android games infiltrate Google Play store, make money for fraudsters
- Report: 6 Palestinian Rights Activists Hacked by NSO Spyware
- Single sign-on moves to the cloud