Key images -- admittedly high resolution images -- have been used to recreate key patterns before. The point of this experiment was to show that the near-ubiquitous web cams and cell phone cameras can capture images of sufficient quality to allow a workable key to be made. Not sure how serious a threat this is or will become -- the researchers have so far declined to share their software -- but it's another serious reminder of just how pervasive the potential for mischief is in our most pervasive technologies.
Announcements
Hackers May Be Able To Unlock Your Doors As Well As Your Data
Now we may have to protect our physical security -- keys and locks -- from hackers. A new experiment suggests that web cam or cell phone images of keys may give crooks all they need to crack your locks.
More Insights
Editors' Choice
Webinars
- A Roadmap to Zero Trust: Steps for Meaningful Progress Amongst the Hype
- Every DDoS Resilience and Response Playbook Should Include These Things
- Rethinking Authentication: MFA, Passwordless, Certificates, and More
- Deciphering the Hype Around XDR
- The Ransomware Evolution: Protecting Against Professionalized Cybercriminal Operations
Reports
White Papers
More Insights