What are the Techniques of Shoulder Surfing?

In order to be successful, the hacker needs to be in close proximity to their victims and not look like they are obviously looking at you. This method is very low risk for hackers, since all they have to do is look at your keyboard or screen when you are typing your password into your device. An attacker will also pay attention to whether or not the victim is glancing around for physical cues around their desk that might tip them off as to what the password is. The most prevalent places that attackers try to find victims are in public places like coffee shops, public transportation, busy restaurants, airports, and other heavily populated places where people are in close proximity to each other.

LEARN ABOUT THE LATEST TECHNOLOGY

The IT industry is always changing and our IT engineers seize every moment to find the best way to keep your business on the leading edge of technology. Here are some articles to help share the knowledge.

All Articles

Operational Recovery Replication vs. CDP (Continuous Data Protection)

Both operational recovery replication and CDP serve a similar purpose, but they achieve their goals very differently. Read more…

View blog

Veeam Backup and Replication Version 11 Release: So Many New Features, Where do We Start?


Learn What’s New in Veeam Version 11

View Case Study