![]() ![]() As the victim enters and views information on the device, the attacker records this data. Most shoulder surfing attacks are straightforward: the attacker positions himself so that they can view the victim’s device screen and the keyboard or keypad if necessary. While most shoulder surfing attacks will occur with malicious intent, some might result from nosy people, where it is more an invasion of privacy. The goal is to obtain information such as usernames and passwords, personally identifiable or sensitive information, and credit card numbers. While it might be as simple as looking over the victim’s shoulder as the name suggests, some attackers will use binoculars, miniature video cameras, or other optical devices to spy on their victims. ![]() It is one of the few attack methods requiring the attacker to be physically close to the victim to succeed. ![]() A shoulder surfing attack describes a situation where the attacker can physically view the device screen and keypad to obtain personal information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |