In the informational and technological know very well that there is no security system completely, fi information system has to be that it be security vulnerabilities that may be dangerous in some cases, the more evolved methods of protection also evolved with the methods of penetration, but do you think that is penetrated your PC 100 meters and without to be connected to the Internet!

Regardless of the protection that followed in order to protect your computer from the eyes of hackers policy, it is always easy to be access to your computer in ways that were not to their credit account. This was disclosed by a group of researchers in the field of security and protection, and has sacrificed Kidd can any hacker that penetrates your computer without even being connected to the Internet or Bluetooth devices.

This innovative way of penetration depends on the security weaknesses of most wireless keyboards, as well as even the mouse, which relies on the same Alambdo.kev that?

Regardless of the protection that followed in order to protect your computer from the eyes of hackers policy, it is always easy to be access to your computer in ways that were not to their credit account. This was disclosed by a group of researchers in the field of security and protection, and has sacrificed Kidd can any hacker that penetrates your computer without even being connected to the Internet or Bluetooth devices.

This innovative way of penetration depends on the security weaknesses of most wireless keyboards, as well as even the mouse, which relies on the same Alambdo.kev that?
We know that the mouse or wireless keyboard often comes with a USB key is piped a small computer in order to connect and transfer data between them. The big problem and the danger lies in the fact could accept any order, regardless of the device that came from it. Thus can the hacker to send a little something to this key and thus can Tetbit any malicious programs on the computer and controlled remotely.

The dangerous thing is that most of the keyboards and wireless mouse with this security flaw and is used widely available all over the world, so the millions of computers vulnerable to hackers. ... And vulnerable to the so-called attacks MouseJack.
Share
mousejack: serious way to penetrate any computer, just 100 meters without being connected to the Internet!
4/
5
Oleh
Unknown