<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Acoustic attacks on Keyboards in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68434#M1125</link>
    <description>&lt;P&gt;It reminds me of that scene in the film Scanners where Cameron Vale uses a pay phone to hack the ConSec mainframe telepathically.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2024 09:28:44 GMT</pubDate>
    <dc:creator>Steve-Wilme</dc:creator>
    <dc:date>2024-03-20T09:28:44Z</dc:date>
    <item>
      <title>Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68323#M1111</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Researchers have demonstrated a new acoustic side-channel attack on keyboards that can deduce user input based on their typing patterns, even in poor conditions, such as environments with noise.&lt;/P&gt;&lt;P&gt;Though the method achieves an average success rate of 43%, which is significantly lower than &lt;A href="https://www.bleepingcomputer.com/news/security/new-acoustic-attack-steals-data-from-keystrokes-with-95-percent-accuracy/" target="_blank" rel="noopener"&gt;other methods&lt;/A&gt; presented in the past, it it does not require controlled recording conditions or a specific typing platform.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/new-acoustic-attack-determines-keystrokes-from-typing-patterns/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/new-acoustic-attack-determines-keystrokes-from-typing-patterns/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These attacks are well known historically within the Technical Countermeasures category, depending on the value of the information being processed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 17 Mar 2024 21:47:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68323#M1111</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-03-17T21:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68335#M1112</link>
      <description>Snap, crackle and pop of the key in the chip… not keyboards I know but acoustic cryptanalysis is also fun.🤩</description>
      <pubDate>Mon, 18 Mar 2024 09:00:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68335#M1112</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-03-18T09:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68337#M1113</link>
      <description>&lt;P&gt;Oh no, all those companies that moved to home working, will need to have tempest protections at all their employees home addresses!&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 11:55:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68337#M1113</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2024-03-18T11:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68345#M1114</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/605041457"&gt;@steve&lt;/a&gt;-Wilme… for the love of god space those ethernet cables 450mm/18 inches apart!&lt;BR /&gt;&lt;BR /&gt;Hang on…What’s Wi-Fi…? &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 14:51:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68345#M1114</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-03-18T14:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68353#M1115</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/797288093"&gt;@Early_Adopter&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;&amp;nbsp; Why are they using keyboards, when they can use screened rooms - Faraday cages and Gen AI to dictate their messages without having to use the keys?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 19:42:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68353#M1115</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-03-18T19:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68354#M1116</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;acoustic side-channel attack on keyboards that can deduce user input based on their typing patterns&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Use voice typing.&amp;nbsp; No keyboard to attack.&amp;nbsp;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 20:47:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68354#M1116</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2024-03-18T20:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68357#M1117</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;&amp;nbsp; Then the attackers, will plant a bug in the locality and listen for the words spoken - so they would just remotely bug the location instead, if the value of the data conveyed had sufficient intrinsic value.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or use a acoustic parabola dish to point towards the target or they would opt to for listening for vibrations or using watching the targets mouth and recording it for playback purposes etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You still need a secure zone or area, if you wanted to protect oneself or employees etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But as one of our colleagues stated revert to TEMPEST techniques and convert the monitor signal into intelligent information etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 00:04:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68357#M1117</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-03-19T00:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68397#M1120</link>
      <description>&lt;P&gt;The obvious solution is to use telepathy instead ... oh, err, wait a minute.&amp;nbsp; Is that a thing or not?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 15:21:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68397#M1120</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2024-03-19T15:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68429#M1124</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;&amp;nbsp; Yes, especially as both Russia and USA did extensive development and testing in this area.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://foreignpolicy.com/2023/01/03/russia-western-psychic-attacks-mystics-astrology-putin-ukraine/" target="_blank"&gt;https://foreignpolicy.com/2023/01/03/russia-western-psychic-attacks-mystics-astrology-putin-ukraine/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 05:08:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68429#M1124</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-03-20T05:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: Acoustic attacks on Keyboards</title>
      <link>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68434#M1125</link>
      <description>&lt;P&gt;It reminds me of that scene in the film Scanners where Cameron Vale uses a pay phone to hack the ConSec mainframe telepathically.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 09:28:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Acoustic-attacks-on-Keyboards/m-p/68434#M1125</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2024-03-20T09:28:44Z</dc:date>
    </item>
  </channel>
</rss>

