In the ever-changing world of technology and retai...
How to Protect Yourself from Thermal Attacks: Computer Experts Share Tips
August 11, 2023 By Monica Green
(Image Credit Google)
How Thermal Attacks Work
Thermal attacks involve the use of heat-sensitive cameras to find any remaining fingerprints on surfaces like smartphone displays, keyboards, and PIN pads. By examining the degree of heat traces left behind on previously touched surfaces, hackers can piece together user passwords. [caption id="" align="aligncenter" width="2000"]
Image credit- Tech Xplore[/caption]
Dr. Mohamed Khamis and his team from the University of Glasgow demonstrated the capability of thermal imaging to decipher passwords in a prior study. They unveiled ThermoSecure, an AI-driven platform that quickly derived passwords from heat-trace photos, therefore significantly raising public awareness of the threat posed by thermal attacks.
In order to prevent thermal attacks on public payment devices, such as ATMs and ticket machines, the same research team has evaluated computer security practices in great detail and conducted surveys to gather user preferences.
A paper describing their findings will be presented at the next USENIX Security Symposium conference. The group also came up with 15 different techniques for lowering the risk of thermal attacks.
[caption id="" align="aligncenter" width="1104"]
Image credit- LifeSecure[/caption]
How to Avoid Thermal Attacks
The recommendations cover a wide range of actions, including putting up physical barriers to protect keys until the heat subsides, using hardware and software solutions like heating elements to remove traces of finger heat, and wearing gloves or rubber thimbles to reduce heat transfer from users' hands. Software updates for existing devices could act as a reminder for consumers to be watchful for thermal camera surveillance. Khamis emphasized the significance of the engagement of thermal camera manufacturers, arguing that implementing new software locks to prevent photos of delicate surfaces might thwart attacks. In the end, our advice to the general public is to try to identify one method that works for their unique routines and behaviors and to use it as frequently as possible in their daily life. It will be more difficult for others to acquire their personal data if they frequently take steps to protect themselves from thermal attacks, Khamis stated. Also read: 5 Easy Steps to Safeguard Your Business from CyberattacksLeave a Reply
Apple's iOS 18: A Leap into the AI Era
March 12, 2024
Google's Regular Pixel 8 Won't Get Gemini Nano AI
March 12, 2024
MacBook Air M3 Makes Amends for M2's Storage Blunder
March 11, 2024
Samsung Unveils the Galaxy M15 5G
March 11, 2024
Elon Musk's xAI to Open-Source Chatbot Grok
March 11, 2024
Contra: Operation Galuga - A Modern Run-and-Gun Classic
March 11, 2024
Musk Confirms X's TV App Arrives This Week
March 11, 2024
RELATED NEWS
2
3
4
5
6
7
8
9
10