CyberSecurity

Collection by Mr. Staples

7 
Pins
 • 
6 
Followers
Mr. Staples
The “KeySweeper” is a tiny, arduino-powered wireless sniffer that captures data sent by your wireless keyboard to its receiver. That’s right—it’s a keylogger, and it doesn’t have to be plugged into your computer to work. Security Tools, Computer Security, Radio Frequency, Phone Charger, Diy Electronics, Arduino, Computer Keyboard, Microsoft, Usb

KeySweeper - covert Microsoft wireless keyboard sniffer using Arduino and nRF24L01+

KeySweeper (http://samy.pl/keysweeper) is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniff...

the Top Tech Support Services You don’t need to have a friend in the tech business to get your computer or device working properly. One of these companies that specialize in remote P… Le Social, Social Media, It Management, Online Trading, Tech Support, Public Relations, Computer Keyboard, Computer Tips, Computer Repair

5 Information Security Trends That Will Dominate 2015

Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2015, information security professionals must understand these five trends.

Called the USBdriveby, it’s basically a USB microcontroller that is small enough to be worn as a necklace. It will connect to computers via USB and is designed to take advantage of the security flaws found in USB ports. Diy Electronics, Electronics Projects, Tech Gadgets, Cool Gadgets, Usb Drive, Usb Flash Drive, Esp8266 Wifi, Must Have Gadgets, Computer Network

This Little USB Necklace Hacks Your Computer In No Time Flat – TechCrunch

Quick! The bad guy/super villain has left the room! Plug in a mysterious device that'll hack up their computer while an on-screen progress bar ticks forward to convey to the audience that things are working! It's a classic scene from basically every spy movie in history. In this case, however, that mystery device is real.

You may remember that last year, a hacker exposed the inner workings of Hacking Team, a company that makes spyware for governments. Now that the dust has settled down, someone claiming to be the hacker has posted all the details on how he did it. Linux, Game Programming, Programming Languages, Computer Programming, Cyber Attack, Samsung, Porno, Sem Internet, Facebook

Massive cyber-spying program 'the Equation Group' discovered

An incredibly sophisticated cyber espionage operation, likely originating in the U.S., has been discovered by the security researchers at Kaspersky Lab.

Leaked Palantir Doc Reveals Uses, Specific Functions And Key Clients – TechCrunch Security Companies, Law Enforcement Agencies, Connect The Dots, Data Analytics, Data Science, Big Data, New Technology, Ecommerce, Raising

Leaked Palantir Doc Reveals Uses, Specific Functions And Key Clients – TechCrunch

Since its founding in 2004, Palantir has managed to grow into a billion dollar company while being very surreptitious about what it does exactly. Conjecture abounds. The vague facts dredged up by reporters confirm that Palantir has created a data mining system used extensively by law enforcement agencies and security companies to connect the dots between known […]

With the Windows Storage Spaces tool, you can pair your hard drives together to consolidate data and add redundancies to all your drives. Pc Hard Drive, Hard Disk Drive, Electronics Projects, Windows 10, Three Way Mirror, Technology Management, Technology News, Disco Duro, Hacks

999: request failed

The NSA May Be Deep in Your Hard Drive: Your Top Headlines for Tuesday