Key Logging - Privacy Invasion from Cell Phone Cables
"Hand Using Mouse at Desk with Keyboard and Cup" by Image Catalog is marked with CC0 1.0 |
What is Key Stroke also called Key logging?
Keystroke often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program in which you can be monitored on your computer activity and phone activity.
Learn more about 👉Keystroke Logging
Did you get a new USB cable for your Birthday, or a Spouse or somebody who wants to spy on you? A security researcher that goes by the name MG (mg.lol/blog/) made the worlds most dangerous USB Cable and it just got better! MG showed motherboard prior in 2019 at a DEF CON hacking conference and now here is the current end product now being sold. MG focus on Apple Lightning USB cable but said the ability to do the same on other cables is possible.
MG tweeted: OMG Cable - "The New Batch Now in USB C, the implant is much smaller, but it’s even more powerful than before. Smartphone/tablet attacks, extreme long range triggers, geofencing, etc."
As shown on a video testing the product from 300 feet away. Video & Music @KANGAkult logo & art contributions @dustrial
Vice.com Reporter Motherboard Joseph Cox spoke with MG:
- "There were people who said that Type C cables were safe from this type of implant because there isn't enough space. So, clearly, I had to prove that wrong. :)," MG told Motherboard in an online chat.
- MG said that the new cables now have geofencing features, where a user can trigger or block the device's payloads based on the physical location of the cable.
- "We tested this out in downtown Oakland and were able to trigger payloads at over 1 mile," he added.
What is Geofencing? Geofencing is a location-based service in which a creator of an app or other platform/software uses GPS, RFID, Wi-Fi or cellular data to send/trigger messages like SMS, Email or In-App/App-based notifications (pre-programmed action) when mobile devices that enter, exit, or remain parked in the geographical location. For more information visit webengage.com
Motherboard only tested the cables in relatively close proximity, but MG said they've improved the range of the cables.
As Shown on Motherboard YouTube - OMG Interface
My personal opinion: why in the heck would anyone want to cause such damage and harm on another human being? What if some creeper wanted to Key Log your Teenage daughter or Teenage son. Me personally I have been a victim of someone who targeted me, this type of activity can lead to great harm. I can only tell you beware of who gives you anything that pertains to Cell Phones, Cables and a Computer. As you can see by the following picture, I purchased a new cable from a legit well known store that carries major brands and when I plug my cell phone my USB-C for a ZTE and the Phone Purchased at MetroPCS, my third party cable, I get a popup screen:
- Your device is charging slowly:
- Use original charger and cable that came with your device.
- Inspect and remove any visible foreign material from cable connection
Here is additional information to read about Key logging on your PC and what you need to know. Please visit usa.kaspersky.com/resource-center/definitions/keylogger
Dare - Challenge - Learn!
No comments:
Post a Comment