1. General Forum

    1. General Discussion

      Don't know where to post? Post here.

    2. New Members

      A place for new members to introduce themselves, get questions answered and get general information.

    3. Show off your speed

      Show off your computer or network.

    4. 28,936
    5. 38,082
    6. Off Topic Discussion

      If it's not computer related please post here.

    7. Make it Faster...

      Post tips and tricks to speed up your connection here. If you have problems please post in the help section.

    8. PC Security

      Discuss antivirus, firewalls, spyware and scams.

    9. Ask & FAQ

      A collection of messages and responses that came via email

    10. Beta Testers

      A forum for discussion of prerelease features

      • No posts to show
  2. Miscellaneous Forums

    1. Bug Reporting

      Report issues with the latest version of

    2. Got any ideas to make better?

      Help build TMN, submit your suggestions!

    3. 26,471
  • Posts

    • And you laugh at my tin foil hat XD
      True, until it's used for something other than what it was intended for. Pretty much just as everything else we know of has been
    • And you laugh at my tin foil hat XD
      You still have to grant the application access to your camera... it's not like you can visit a website and they can instantly access your camera.
    • And you laugh at my tin foil hat XD
      Democratizing Webcam Eye Tracking on the Browser:   WebGazer.js is an eye tracking library that uses common webcams to infer the eye-gaze locations of web visitors on a page in real time. The eye tracking model it contains self-calibrates by watching web visitors interact with the web page and trains a mapping between the features of the eye and positions on the screen. WebGazer.js was built It is written entirely in JavaScript and with only a few lines of code can be integrated in any website that wishes to better understand their visitors and transform their user experience. WebGazer.js runs entirely in the client browser, so no video data needs to be sent to a server. Source   Now you understand why that sticky note hangs over my cam on the laptop. Though, this is not new technology, just getting a bit more ingrained in daily life.  
    • Keystroke loggers disguised as USB chargers
       FBI officials are warning private industry partners to be on the lookout for highly stealthy keystroke loggers that surreptitiously sniff passwords and other input typed into wireless keyboards.   The FBI's Private Industry Notification is dated April 29, more than 15 months after whitehat hacker Samy Kamkar released a KeySweeper, a proof-of-concept attack platform that covertly logged and decrypted keystrokes from many Microsoft-branded wireless keyboards and transmitted the data over cellular networks. To lower the chances that the sniffing device might be discovered by a target, Kamkar designed it to look almost identical to USB phone chargers that are nearly ubiquitous in homes and offices.   "If placed strategically in an office or other location where individuals might use wireless devices, a malicious cyber actor could potentially harvest personally identifiable information, intellectual property, trade secrets, passwords, or other sensitive information," FBI officials wrote in last month's advisory. "Since the data is intercepted prior to reaching the CPU, security managers may not have insight into how sensitive information is being stolen." It's not clear why the FBI waited so long to warn private industry players of the KeySweeper threat. The notification, which says the information was obtained through an undescribed "investigation," makes no mention of malicious sniffers being found in the wild. Kamkar told Ars that he hasn't heard of any reports of real attacks using devices similar to KeySweeper but that he couldn't rule out the possibility, either. Microsoft officials have pointed out that sniffing attacks work against any wireless device that doesn't use strong cryptography to encrypt the data transmitted between a keyboard and the computer it's connected to. The officials have said that company-branded keyboards manufactured after 2011 are protected because they use the Advanced Encryption Standard. Bluetooth-enabled wireless keyboards are also protected. Anyone using a wireless keyboard from Microsoft or any other maker should ensure it's using strong cryptography to prevent nearby devices from eavesdropping on the radio signal and logging keystrokes. Source   This is interesting in several ways, first, this has been happening on peripherals for ages. Secondly, why the OMG FBI warning you say? That means it's an old issue that has been exploited to it maximum usability, and there are many other means to accomplish the very same thing. imo of course.
    • sharing
      What type of file will they accept?
  • Topics