7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

Picture that key in the palm of the wrong hand
surveillance

Image by Thinkstock

Using a telephoto lens from up to 200-feet or a smartphone up close, attackers can turn a clear pic of a master key or high-security key into easy enterprise access, using a 3D printer to create the duplicate. With special software code like what two MIT students created for DefCon 21, criminal hackers can ensure that the necessary key measurements make it from the photo to the new key.

To read this article in full or to leave a comment, please click here

Read more: 7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

Story added 31. March 2017, content source with full text you can find at link above.