Key images -- admittedly high resolution images -- have been used to recreate key patterns before. The point of this experiment was to show that the near-ubiquitous web cams and cell phone cameras can capture images of sufficient quality to allow a workable key to be made. Not sure how serious a threat this is or will become -- the researchers have so far declined to share their software -- but it's another serious reminder of just how pervasive the potential for mischief is in our most pervasive technologies.
Announcements
Hackers May Be Able To Unlock Your Doors As Well As Your Data
Now we may have to protect our physical security -- keys and locks -- from hackers. A new experiment suggests that web cam or cell phone images of keys may give crooks all they need to crack your locks.
More Insights
Editors' Choice
Webinars
Reports
- How to Use Threat Intelligence to Mitigate Third-Party Risk
- Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
- Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
- How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment
- Successfully Managing Identity in Modern Cloud and Hybrid Environments
White Papers
More Insights