Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Awareness is key

Why is it that the truly important news items are buried to page 6? (hint: “consumer confidence”)

Consider this buried item: A $10 USB charger with built-in wireless keylogger means more security headaches

Think that keeping hackers out of your digital fortress is already hard work, or that that BYOD is a security timebomb waiting to blow up in your face? Well, here’s something new for you to worry about – a $10 USB charger that features a built-in wireless keylogger.” Read more..

I mean.. really think about that.

Kinda changes the meaning behind “built in China”, doesn’t it? (But, you should have known that if you noticed the “infected digital picture frames” stories from a few years back.)

Today’s quote:It’s not what you look at that matters, it’s what you see.” ~ Henry David Thoreau

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

January 14, 2015 - Posted by | computers, consumer electronics, cyber crime, Cyberwarfare, gadgets, hackers, hardware, Internet, News, privacy, security, tech

3 Comments »

  1. hello if i go cybercafe someone who installed keylogger on his computer for hack anyone a/c so how can i identify keylogger is installed or not?

    Like

    Comment by suraj | January 14, 2015 | Reply

  2. techpaul i listen hacking is possible also from cookies and cache this is true if yes this is true tell me how hackers identify full cookies and cache in someone’s browsers for hacking thankx.

    Like

    Comment by h.ali | January 14, 2015 | Reply

    • suraj, h.ali,
      I can only refer you to a good starting point to learn the answers: look up (I’d start on Wikipedia) “man-in-the-middle” and “rogue hotspot”.

      (and as the article states, it’d be near impossible to spot a passive wireless keylogger.)

      Like

      Comment by techpaul | January 15, 2015 | Reply


Post your Comment/Question

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: