News

According to Patrick Traynor (Computer Science), a stranger's smartphone could potentially pick up data typed into a nearby laptop computer by using the phone's accelerometer to detect vibrations produced by typing. Source: Examiner

Visit Website

The attack using a smartphone's accelerometer attempts to predict keystrokes in pairs, says Patrick Traynor (Computer Science), using the distance between keys and their position on the keyboard as hints for a custom dictionary. As long as the word is longer than two letters, the system has a good chance of detecting what’s been pressed. Source: Gizmodo

Visit Website

How worried should you be that the phone sitting near your desktop is conspiring against you? Not too much--the chances of becoming a victim of this type of advanced attack are slim, for now. "This was really hard to do," said Patrick Traynor (Computer Science). "But could people do it if they really wanted to? We think yes." Source: MSNBC

Visit Website

In his presentation at this week's Open Network Summit in San Francisco, Nick Feamster (Computer Science) said the simplicity enabled by OpenFlow and software-defined networks can be used to make more powerful and easier-to-use network management tools. Source: Network World

Visit Website

You sit down at your desk, set down your mobile phone, boot your computer and then start work. Would it occur to you that a hacker might be using your smartphone as a spying device to track what you were typing? Source: ComputerWorld

Visit Website

As you logged into your favorite blog to write a comment this morning, think about where your smartphone was sitting. Was it next to your keyboard? If so, a hacker could have used it to track and decipher every word of your insightful anonymous commentary. Source: Popular Science

Visit Website

What if a hacker could log every key you typed on your PC by placing a cellphone nearby? Patrick Traynor (Computer Science) and colleagues have shown how this is possible using the latest generation of smartphones. Source: Times of India

Visit Website

If you're looking for a reason (other than price) to buy an iPhone 3GS as opposed to an iPhone 4, here's one: according to Patrick Traynor (Computer Science) it's possible that malware on an iPhone 4 can detect and deduce what someone is typing on a nearby keyboard. Source: Gizmag

Visit Website

Higher education institutions that spend millions of dollars building sports teams of virtually professional standard are symptomatic, says Rich DeMillo (Computer Science), of many American universities that have become too focused on inappropriate and often unwinnable competitions. Source: Times Higher Education

Visit Website

Similar keylogging methods have been developed using a smartphone's microphone, but malware masquerading as a legitimate app can usually access a smartphone's accelerometer without tripping built-in security features, according to researcher Patrick Traynor (Computer Science) and colleagues. Source: Ars Technica

Visit Website