• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Research/How to do it

Researchers Show How Hackers Could Steal Passwords And Data Via USB Connections

Theresa Casimir by Theresa Casimir
August 13, 2017
in Research/How to do it, Security
Share on FacebookShare on Twitter

No matter how secure you think your electronic device from a computer down to a mobile phone is,  as long as you can have Internet access in it , it can be hacked without you ever knowing it.  Hackers are smart and genius when it comes to data and technology they just have a way to get into your device and research has shown that when it comes to protection, USB connections have proven to be the weakest link in the chain.

According to the study by the University of Adelaide in a study, external USB drivers are very valuable when it comes to information leaking and over the years it has raised more concern among people and questions have been asked about the security of using an external USB drive on a secure computer. According to the research, test carried out on 70 computers with external USB drivers over 90% of information on the computer was leaked, making it a very high percentage in terms of the security of the computer and the document in it leaving them at high risk.

Project leader Dr Yuval Yarom, Research Associate with the University of Adelaide’s School of Computer Science in a press statement said “USB-connected devices include keyboards, card swipes and fingerprint readers which often send sensitive information to the computer.

But the research showed that if a malicious device  that’s been tampered with is plugged into adjacent ports on the same external or internal USB hub, this sensitive information can be captured.” That means keystrokes showing passwords or other private information can be easily stolen and the researchers have compared such data leaks to like water leaking from pipes.

According to them, “voltage fluctuations of the USB port’s data lines can be monitored from the adjacent ports on the USB hub.” In the test carried out, the researchers used a novelty plug in lamp with the USB connector to interpret every key stroke from keyboard USB port, so once the Bluetooth adaptor of the computer is on and connected to the keyboard it can send data from the computer to an external USB or another computer in few minutes without the prior knowledge of the owner of the computer.

With this discovery from the researchers lots of security questions were asked, and lectures on tempered USB sticks were carried out to ensure that these users are aware of the risk of allowing a tampered USB stick to be inserted in their computer and how to avoid risk having their data on the computer leaked and transferred to another computer anywhere in the world.

The future of USB connection should be redesigned to help boost security for computer users to enable them receive and accept data from other secure external drives , so as to avoid the fear of been hacked or data leakage. This also means that users should encrypt their documents or only connect to trusted USB drivers.

Related Posts:

  • Fastest-VPN-for-Streaming-Movies-TV-Shows
    5 Reasons To Consider Using A VPN When Streaming…
  • Screenshot-513-e1718290879733-920×513
    Apple Password App Security Flaw Exposed Users to…
  • nvidia
    DiffUHaul, an AI Tool from Nvidia Research, Enables…
  • IMG_3652-edited-scaled
    60% of Nigerian 4G Users Don't Access Mobile Internet
  • apple-reuters-image-163135177316×9
    Apple Is Introducing End-To-End Encryption To iCloud Backups
  • restart
    'Inactivity Reboot' on the iPhone Restarts Device…
  • Proton-Launches-Cross-Platform-Authenticator-App-with-Secure-Sync
    Proton Launch A New 2FA App
  • passkey-sync
    Google Begins Rollout Of Passkeys Across Its Services

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: australiahackersresearchresearcherssecurityuniveristyusb
Theresa Casimir

Theresa Casimir

New at TechBooky, write on important tech stuff from around the world

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Meta Previews New AI Parental Controls October 18, 2025
  • ChatGPT Mobile App Sees Drop in Usage and Downloads October 18, 2025
  • Facebook’s AI Now Suggests Photo Edits on Phones October 18, 2025
  • Reddit Expands AI Search to 5 New Languages October 18, 2025
  • Meta Ends Messenger Desktop Apps for Mac and Windows October 18, 2025
  • Microsoft Rolls Out New Windows 11 AI Copilot Features October 16, 2025

Browse Archives

October 2025
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
2728293031 
« Sep    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.