In case you’re unfamiliar, Fujitsu is a popular wireless keyboard. Recently, researchers discovered a keyboard bug that can perform keystroke tracking from 150 ft away. These findings were unveiled with a computer system running with a Fujitsu Wireless Keyboard Set LX901.
News from Fujitsu
This cybersecurity threat does not have a CVE number, but its CVSS score is estimated at 8.8, making it a severe flaw. Though researchers claimed this is a high-security concern, Fujitsu is still working on a solution.
What Does This Keystroke Tracking Bug Do?
Now, the way the Fujitsu wireless keyboard works is by transmitting keystrokes to a desktop via radio waves. To do this, the device uses AES-encrypted data packets. This is all fine; the problem lies within the receiver. The receiver will process encrypted and unencrypted data packets, making it vulnerable to keystroke injection attacks. In short, a hacker can easily take over the functionality of your desktop through your keyboard.
How Can I Do to Avoid Keystroke Tracking?
There is good news. This form of hacking is difficult, and the hacker would have to be in close proximity to their target to access the wireless keyboard. There are also several anti-keylogging tools available to help protect you in the case of an attack.
On the Right Track
The best way to avoid keyloggers is to stay informed on the latest hacking methods. Looking for more information on cybersecurity? Click here.
The EMPIST Effect
Software provides a gateway to further business innovation. The more that you and your company do to stay on top of software news and actually embrace more software within your business, the more benefits your business will reap. Whether you explore an online ticketing system for customer support (like EMPIST’s own Deskware) or a cloud technology platform, there’s no doubt that it will show more efficient results at your business. Give your company a competitive advantage with the right scaling software. Evolve with software and grow efficiently.