Key images -- admittedly high resolution images -- have been used to recreate key patterns before. The point of this experiment was to show that the near-ubiquitous web cams and cell phone cameras can capture images of sufficient quality to allow a workable key to be made. Not sure how serious a threat this is or will become -- the researchers have so far declined to share their software -- but it's another serious reminder of just how pervasive the potential for mischief is in our most pervasive technologies.
1 MIN READ
Hackers May Be Able To Unlock Your Doors As Well As Your Data
Now we may have to protect our physical security -- keys and locks -- from hackers. A new experiment suggests that web cam or cell phone images of keys may give crooks all they need to crack your locks.
- Using Zero Trust to Protect Remote and Home Workers
- Strategies for DDoS Resilience and Response
- Next-Gen Security Operations: Building the SOC of the Future
- Hacks That Bypass Multi-Factor Authentication and How to Make Your MFA Solution Phishing Resistant
- Threat Hunting Today: The Tools and Techniques That Get You Out in Front of Criminals
- Breaches Prompt Changes to Enterprise IR Plans and Processes
- Implementing Zero Trust In Your Enterprise: How to Get Started
- 6 Elements of a Solid IoT Security Strategy
- Incorporating a Prevention Mindset into Threat Detection and Response
- Practical Network Security Approaches for a Multicloud, Hybrid IT World