• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Research/How to do it

Researchers Show How Hackers Could Steal Passwords And Data Via USB Connections

Theresa Casimir by Theresa Casimir
August 13, 2017
in Research/How to do it, Security
Share on FacebookShare on Twitter

No matter how secure you think your electronic device from a computer down to a mobile phone is,  as long as you can have Internet access in it , it can be hacked without you ever knowing it.  Hackers are smart and genius when it comes to data and technology they just have a way to get into your device and research has shown that when it comes to protection, USB connections have proven to be the weakest link in the chain.

According to the study by the University of Adelaide in a study, external USB drivers are very valuable when it comes to information leaking and over the years it has raised more concern among people and questions have been asked about the security of using an external USB drive on a secure computer. According to the research, test carried out on 70 computers with external USB drivers over 90% of information on the computer was leaked, making it a very high percentage in terms of the security of the computer and the document in it leaving them at high risk.

Project leader Dr Yuval Yarom, Research Associate with the University of Adelaide’s School of Computer Science in a press statement said “USB-connected devices include keyboards, card swipes and fingerprint readers which often send sensitive information to the computer.

But the research showed that if a malicious device  that’s been tampered with is plugged into adjacent ports on the same external or internal USB hub, this sensitive information can be captured.” That means keystrokes showing passwords or other private information can be easily stolen and the researchers have compared such data leaks to like water leaking from pipes.

According to them, “voltage fluctuations of the USB port’s data lines can be monitored from the adjacent ports on the USB hub.” In the test carried out, the researchers used a novelty plug in lamp with the USB connector to interpret every key stroke from keyboard USB port, so once the Bluetooth adaptor of the computer is on and connected to the keyboard it can send data from the computer to an external USB or another computer in few minutes without the prior knowledge of the owner of the computer.

With this discovery from the researchers lots of security questions were asked, and lectures on tempered USB sticks were carried out to ensure that these users are aware of the risk of allowing a tampered USB stick to be inserted in their computer and how to avoid risk having their data on the computer leaked and transferred to another computer anywhere in the world.

The future of USB connection should be redesigned to help boost security for computer users to enable them receive and accept data from other secure external drives , so as to avoid the fear of been hacked or data leakage. This also means that users should encrypt their documents or only connect to trusted USB drivers.

Related Posts:

  • Fastest-VPN-for-Streaming-Movies-TV-Shows
    5 Reasons To Consider Using A VPN When Streaming…
  • This Latest Crypto Hack Sees $100 Million Worth Of…
  • Screenshot-513-e1718290879733-920×513
    Apple Password App Security Flaw Exposed Users to…
  • nvidia
    DiffUHaul, an AI Tool from Nvidia Research, Enables…
  • IMG_3652-edited-scaled
    60% of Nigerian 4G Users Don't Access Mobile Internet
  • apple-reuters-image-163135177316×9
    Apple Is Introducing End-To-End Encryption To iCloud Backups
  • restart
    'Inactivity Reboot' on the iPhone Restarts Device…
  • Proton-Launches-Cross-Platform-Authenticator-App-with-Secure-Sync
    Proton Launch A New 2FA App

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: australiahackersresearchresearcherssecurityuniveristyusb
Theresa Casimir

Theresa Casimir

New at TechBooky, write on important tech stuff from around the world

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Microsoft Fixes Windows Certificate Enrolment Bug September 1, 2025
  • Microsoft to Enforce MFA on Azure Resource Management in October September 1, 2025
  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025
  • Threads Tests Long-Form Text Sharing Feature August 29, 2025
  • WhatsApp Tests AI to Rephrase Messages and Adjust Tone August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.