• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Research/How to do it

Researchers Show How Hackers Could Steal Passwords And Data Via USB Connections

Theresa Casimir by Theresa Casimir
August 13, 2017
in Research/How to do it, Security
Share on FacebookShare on Twitter

No matter how secure you think your electronic device from a computer down to a mobile phone is,  as long as you can have Internet access in it , it can be hacked without you ever knowing it.  Hackers are smart and genius when it comes to data and technology they just have a way to get into your device and research has shown that when it comes to protection, USB connections have proven to be the weakest link in the chain.

According to the study by the University of Adelaide in a study, external USB drivers are very valuable when it comes to information leaking and over the years it has raised more concern among people and questions have been asked about the security of using an external USB drive on a secure computer. According to the research, test carried out on 70 computers with external USB drivers over 90% of information on the computer was leaked, making it a very high percentage in terms of the security of the computer and the document in it leaving them at high risk.

Project leader Dr Yuval Yarom, Research Associate with the University of Adelaide’s School of Computer Science in a press statement said “USB-connected devices include keyboards, card swipes and fingerprint readers which often send sensitive information to the computer.

But the research showed that if a malicious device  that’s been tampered with is plugged into adjacent ports on the same external or internal USB hub, this sensitive information can be captured.” That means keystrokes showing passwords or other private information can be easily stolen and the researchers have compared such data leaks to like water leaking from pipes.

According to them, “voltage fluctuations of the USB port’s data lines can be monitored from the adjacent ports on the USB hub.” In the test carried out, the researchers used a novelty plug in lamp with the USB connector to interpret every key stroke from keyboard USB port, so once the Bluetooth adaptor of the computer is on and connected to the keyboard it can send data from the computer to an external USB or another computer in few minutes without the prior knowledge of the owner of the computer.

With this discovery from the researchers lots of security questions were asked, and lectures on tempered USB sticks were carried out to ensure that these users are aware of the risk of allowing a tampered USB stick to be inserted in their computer and how to avoid risk having their data on the computer leaked and transferred to another computer anywhere in the world.

The future of USB connection should be redesigned to help boost security for computer users to enable them receive and accept data from other secure external drives , so as to avoid the fear of been hacked or data leakage. This also means that users should encrypt their documents or only connect to trusted USB drivers.

Related Posts:

  • Fastest-VPN-for-Streaming-Movies-TV-Shows
    5 Reasons To Consider Using A VPN When Streaming…
  • Screenshot-513-e1718290879733-920×513
    Apple Password App Security Flaw Exposed Users to…
  • nvidia
    DiffUHaul, an AI Tool from Nvidia Research, Enables…
  • IMG_3652-edited-scaled
    60% of Nigerian 4G Users Don't Access Mobile Internet
  • restart
    'Inactivity Reboot' on the iPhone Restarts Device…
  • Proton-Launches-Cross-Platform-Authenticator-App-with-Secure-Sync
    Proton Launch A New 2FA App
  • 3592
    WhatsApp Vulnerability May Have Exposed Billions of Numbers
  • passkey-sync
    Google Begins Rollout Of Passkeys Across Its Services

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: australiahackersresearchresearcherssecurityuniveristyusb
Theresa Casimir

Theresa Casimir

New at TechBooky, write on important tech stuff from around the world

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Cursor Introduces An AI Coding Tool For Designers December 12, 2025
  • OpenAI Unveils More Advanced Model as Google Rivalry Grows December 12, 2025
  • WhatsApp Is Redefining The Voicemail Features For Users December 12, 2025
  • Microsoft’s Nadella Is Building a Cricket App in His Spare Time December 12, 2025
  • Google Photos Expands ‘Remix’ Feature to More Countries December 12, 2025
  • Google Play Store Reinstates Fortnite December 12, 2025
  • Vodacom Announces Price Hike December 12, 2025
  • ChatGPT Set to Launch ‘Adult Mode’ By Q1 2026 December 12, 2025
  • Amazon to Invest $35B in India by 2030 for Jobs & AI Growth December 11, 2025
  • SpaceX May Launch Its Big IPO Next Year With a $1tr Valuation December 11, 2025
  • GPT-5.2 Debuts as OpenAI Answers “Code Red” Challenge December 11, 2025
  • Netflix Plans Heavy Borrowing to Fund Warner Bros Deal December 11, 2025

Browse Archives

December 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
293031 
« Nov    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.