7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

Image by Thinkstock
Using a telephoto lens from up to 200-feet or a smartphone up close, attackers can turn a clear pic of a master key or high-security key into easy enterprise access, using a 3D printer to create the duplicate. With special software code like what two MIT students created for DefCon 21, criminal hackers can ensure that the necessary key measurements make it from the photo to the new key.
To read this article in full or to leave a comment, please click here
Story added 31. March 2017, content source with full text you can find at link above.
More antivirus and malware news?
- ZDI Announces Rules and Prizes for Pwn2Own 2022
- New eLion Adviser
- Tenable to Acquire Eureka Security to Boost DSPM Capabilities
- Cisco edges F5 in VPN shootout
- For an obfuscated password, not bad at all
- ID.me Snags $100M in Series C Funding
- Send Wi-Fi companies floor plans, receive the ultimate mesh networking test
- Intel Shares Details on New CPUs With Spectre, Meltdown Protections
- Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks
- PwnPad Network-Hacking Kit