• Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Home Research/How to do it

Researchers Show How Hackers Could Steal Passwords And Data Via USB Connections

Theresa Casimir by Theresa Casimir
August 13, 2017
in Research/How to do it, Security
Share on FacebookShare on Twitter

No matter how secure you think your electronic device from a computer down to a mobile phone is,  as long as you can have Internet access in it , it can be hacked without you ever knowing it.  Hackers are smart and genius when it comes to data and technology they just have a way to get into your device and research has shown that when it comes to protection, USB connections have proven to be the weakest link in the chain.

According to the study by the University of Adelaide in a study, external USB drivers are very valuable when it comes to information leaking and over the years it has raised more concern among people and questions have been asked about the security of using an external USB drive on a secure computer. According to the research, test carried out on 70 computers with external USB drivers over 90% of information on the computer was leaked, making it a very high percentage in terms of the security of the computer and the document in it leaving them at high risk.

Project leader Dr Yuval Yarom, Research Associate with the University of Adelaide’s School of Computer Science in a press statement said “USB-connected devices include keyboards, card swipes and fingerprint readers which often send sensitive information to the computer.

But the research showed that if a malicious device  that’s been tampered with is plugged into adjacent ports on the same external or internal USB hub, this sensitive information can be captured.” That means keystrokes showing passwords or other private information can be easily stolen and the researchers have compared such data leaks to like water leaking from pipes.

According to them, “voltage fluctuations of the USB port’s data lines can be monitored from the adjacent ports on the USB hub.” In the test carried out, the researchers used a novelty plug in lamp with the USB connector to interpret every key stroke from keyboard USB port, so once the Bluetooth adaptor of the computer is on and connected to the keyboard it can send data from the computer to an external USB or another computer in few minutes without the prior knowledge of the owner of the computer.

With this discovery from the researchers lots of security questions were asked, and lectures on tempered USB sticks were carried out to ensure that these users are aware of the risk of allowing a tampered USB stick to be inserted in their computer and how to avoid risk having their data on the computer leaked and transferred to another computer anywhere in the world.

The future of USB connection should be redesigned to help boost security for computer users to enable them receive and accept data from other secure external drives , so as to avoid the fear of been hacked or data leakage. This also means that users should encrypt their documents or only connect to trusted USB drivers.

Related Posts:

  • Fastest-VPN-for-Streaming-Movies-TV-Shows
    5 Reasons To Consider Using A VPN When Streaming…
  • best-hidden-spy-apps-for-Android
    3 Signs Of Phone Tracking To Look Out For
  • hacking-passwords
    $2 billion Worth Of Cryptocurrencies Have Been…
  • This Latest Crypto Hack Sees $100 Million Worth Of…
  • Screenshot-513-e1718290879733-920×513
    Apple Password App Security Flaw Exposed Users to…
  • nvidia
    DiffUHaul, an AI Tool from Nvidia Research, Enables…
  • IMG_3652-edited-scaled
    60% of Nigerian 4G Users Don't Access Mobile Internet
  • apple-reuters-image-163135177316×9
    Apple Is Introducing End-To-End Encryption To iCloud Backups

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: australiahackersresearchresearcherssecurityuniveristyusb
Theresa Casimir

Theresa Casimir

New at TechBooky, write on important tech stuff from around the world

BROWSE BY CATEGORIES

Select Category

    Receive top tech news directly in your inbox

    subscription from
    Loading

    Freshly Squeezed

    • IBM Posts Strongest Revenue Growth in Decade on AI Mainframes July 23, 2025
    • Tesla Q2 Misses on Profit, But Musk Bets Big on Robotaxis and $25k Model 2 July 23, 2025
    • Alphabet Q2 Earnings hit $96B Revenue as AI Drives Growth July 23, 2025
    • iOS 26 Public Beta Delayed Despite our Earlier Report July 23, 2025
    • Apple Has Released the iOS 26 in Public Beta, Here’s How to Get It July 23, 2025
    • Apple Set to Release iOS 26 Public Beta: Here’s What to Know July 23, 2025

    Browse Archives

    July 2025
    MTWTFSS
     123456
    78910111213
    14151617181920
    21222324252627
    28293031 
    « Jun    

    Quick Links

    • About TechBooky
    • Advertise Here
    • Contact us
    • Submit Article
    • Privacy Policy
    Generic selectors
    Exact matches only
    Search in title
    Search in content
    Post Type Selectors
    • African
    • Artificial Intelligence
    • Gadgets
    • Metaverse
    • Tips
    • About TechBooky
    • Advertise Here
    • Submit Article
    • Contact us

    © 2025 Designed By TechBooky Elite

    Discover more from TechBooky

    Subscribe now to keep reading and get access to the full archive.

    Continue reading

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.