#side-channel-attack

[ follow ]
Information security
fromWIRED
2 weeks ago

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

Pixnapping enables a permissionless Android app to read other apps' on-screen sensitive data, stealing 2FA codes and messages in under 30 seconds.
#android-security
fromZDNET
2 weeks ago
Information security

This new 'Pixnapping' exploit can steal everything on your Android screen - even 2FA codes

Pixnapping is an Android side-channel attack that extracts displayed data, including 2FA codes, by abusing rendering APIs, pixel operations, and a hardware channel without extra permissions.
fromTheregister
2 weeks ago
Information security

Android Pixnapping attack can capture app data like 2FA info

Pixnapping enables malicious Android apps to read and exfiltrate pixel-level display data from other apps and websites, including two-factor authentication codes.
fromZDNET
2 weeks ago
Information security

This new 'Pixnapping' exploit can steal everything on your Android screen - even 2FA codes

fromArs Technica
2 weeks ago

No fix yet for attack that lets hackers pluck 2FA codes from Android phones

The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work.
Information security
fromCSO Online
3 weeks ago

Is your computer's mouse listening to you?

What makes this attack practical is the sensitivity of today's mice, both their high polling rate (the frequency at which they sample movement, measured in kHz), and the resolution with which they detect movement, measured in dots per inch (DPI).
Information security
fromTheregister
3 weeks ago

How your mouse could eavesdrop and rat you out

The mouse sitting next to you can be turned into a microphone thanks to some cunning use of its sensors to pick up vibrations from your voice in an attack dubbed Mic-E-Mouse. Researchers at UC Irvine have found that optical mice equipped with 20,000 DPI sensors and decent latency can be used as a basic microphone with software designed to figure out speech patterns based on the vibration of the user's voice. The team used a $35 mouse to test the system and found it could capture speech with 61 percent accuracy, depending on voice frequency.
Information security
fromsfist.com
3 weeks ago

Some Optical Gaming Mice Can Be Manipulated to Spy on Users Through AI, Researchers Warn

Researchers at UC Irvine uncovered a vulnerability that enables some gaming mice with polling rates of 4,000 Hz or higher many of which are developed in the Bay Area to be turned into spyware, capturing conversations through desk vibrations using AI. As Tom's Hardware reports, security researchers from the University of California Irvine found a way to use high-end optical gaming mice containing advanced sensors that can sample data up to 8,000 times per second, per Hoodline, to record users' conversations via desk vibrations.
Information security
Privacy professionals
fromTheregister
3 months ago

AMD warns of new Meltdown, Spectre-like bugs affecting CPUs

AMD's chips are vulnerable to a new side-channel attack called the Transient Scheduler Attack, which could lead to information disclosure.
[ Load more ]