7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

Image by Thinkstock
Using a telephoto lens from up to 200-feet or a smartphone up close, attackers can turn a clear pic of a master key or high-security key into easy enterprise access, using a 3D printer to create the duplicate. With special software code like what two MIT students created for DefCon 21, criminal hackers can ensure that the necessary key measurements make it from the photo to the new key.
To read this article in full or to leave a comment, please click here
Story added 31. March 2017, content source with full text you can find at link above.
More antivirus and malware news?
- Tech Support Scammers Exploiting Unpatched Firefox Bug
- How to Get Safari’s New Privacy Features in Chrome and Firefox
- Facebook quashes "myths" about in-app audio recognition
- Serious Security: How to make sure you don’t miss bug reports!
- Apple CEO Escalates Battle With Facebook Over Online Privacy
- Get ready, IT; here comes the Internet of Things
- Stuxnet cyberattack by US a ‘destabilizing and dangerous’ course of action, security expert Bruce Schneier says
- Huawei checking claims of vulnerabilities in its routers
- NSA Publishes Guidance on UEFI Secure Boot Customization
- Continuous Monitoring: A New Approach to Proactively Protecting Your Global Network Perimeter