Wednesday, 26 February 2014

Hardware keylogger in cyber cafe whether threat to your information?


Story: 
If you visit a cyber cafe and find any black pin attached to your CPU as shown in the picture, kindly do not use that system.
Please Share: Dear friends, If you visit a cyber cafe and find any black pin attached to your CPU as shown in the picture, kindly do not use that system.
This pin is actually a connection which save all your data you enter into the system. Thus, it is a risk to your privacy over the net. Risk to passwords, banking or any other personal data you enter. Its a very powerful hardware keylogger, it records each and every action you make on the system. So, If you use internet cafés then you may have to ask to see the back of the PC...
Its a very powerful hardware keylogger, it records each and every action you make on the system. So, If you use internet cafés then you may have to ask to see the back of the PC...
Its a very powerful hardware keylogger, it records each and every action you make on the system. So, If you use internet cafés then you may have to ask to see the back of the PC...

Hoax or Fact:

Mixture of hoax and facts.Analysis:
The message claims that cyber cafe users attach black pins to their CPUs to hack the information and data of cyber cafe users. It is a fact that such a technology exists. They are called hardware keyloggers - the components that log your keystrokes, and they do look like the one shown in picture. But they come in various shapes and colors,
and are an old and costly means to hack the user information via CPU. Instead of these hardware keyloggers, there are many effective software keyloggers available that are less costly and can be easily installed in cyber systems. The point here is that cyber cafe owners not always seek to such illegal and insecure means to risk their customer base. The aim of this message is only to spread unnecessary worry and panic among cyber users. Data hacking through CPU is an infrequent problem.
However, cyber cafe users are always advised to be careful when they are using shared computers. It is better to avoid entering private sensitive information into them.
Print Page

No comments:

Post a Comment