Jackit: how mice become Trojans
Table of contents:
Computer security is routinely at risk. More and more ways are being sought in which to attack users. Today is the turn of a new way. This is JackIt, an exploit that uses the technique of mouse kidnapping or Mousejack.
JackIt: How mice become Trojans
Mousejack is a set of vulnerabilities that affects mice and other wireless devices. Through specific software, it can allow the attacker to take control of a wireless keyboard or mouse remotely. And JackIt is a specific exploit created to take advantage of these Mousejack vulnerabilities.
Kidnapping of mice or wireless devices
This exploit has served to show that there are a huge number of wireless devices that are vulnerable to this type of attack. Virtually any brand from Microsoft to Logitech is. Furthermore, these types of attacks affect both Windows and macOS. At the moment it seems that Linux is the only one that is saved.
Also, carrying out such attacks with an exploit like JackIt is not that complicated. It is enough to have a USB device that costs $ 30 and download specific software that is available online. So users with some skill could carry out these attacks without too many complications.
For users, it is recommended that they have the latest filmware update for their mice updated. In this way they can be protected. Also, the use of moments or keyboards that connect through more secure methods such as Bluetooth is recommended to avoid these attacks. For Windows users, a security patch has been available since last year.
Windows phone will become windows
Microsoft intends to unify all its devices under a single operating system and now there is proof that Windows Phone will be Windows
Raspberry pi will receive a screen to become a tablet
The creators of the Raspberry Pi prepare a touch screen to turn this small computer into a tablet increasing its versatility
Differences between viruses, worms, Trojans, spyware and malware
We bring you a good tutorial of what are the differences between a virus, a worm, a Trojan, a malware, a botnet. We explain each of them and their functions.