Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Awareness is key

Why is it that the truly important news items are buried to page 6? (hint: “consumer confidence”)

Consider this buried item: A $10 USB charger with built-in wireless keylogger means more security headaches

Think that keeping hackers out of your digital fortress is already hard work, or that that BYOD is a security timebomb waiting to blow up in your face? Well, here’s something new for you to worry about – a $10 USB charger that features a built-in wireless keylogger.” Read more..

I mean.. really think about that.

Kinda changes the meaning behind “built in China”, doesn’t it? (But, you should have known that if you noticed the “infected digital picture frames” stories from a few years back.)

Today’s quote:It’s not what you look at that matters, it’s what you see.” ~ Henry David Thoreau

Copyright 2007-2015 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.


>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<


All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.

January 14, 2015 - Posted by | computers, consumer electronics, cyber crime, Cyberwarfare, gadgets, hackers, hardware, Internet, News, privacy, security, tech

3 Comments »

  1. hello if i go cybercafe someone who installed keylogger on his computer for hack anyone a/c so how can i identify keylogger is installed or not?

    Like

    Comment by suraj | January 14, 2015 | Reply

  2. techpaul i listen hacking is possible also from cookies and cache this is true if yes this is true tell me how hackers identify full cookies and cache in someone’s browsers for hacking thankx.

    Like

    Comment by h.ali | January 14, 2015 | Reply

    • suraj, h.ali,
      I can only refer you to a good starting point to learn the answers: look up (I’d start on Wikipedia) “man-in-the-middle” and “rogue hotspot”.

      (and as the article states, it’d be near impossible to spot a passive wireless keylogger.)

      Like

      Comment by techpaul | January 15, 2015 | Reply


Post your Comment/Question