What comes to mind when you think of hacking? Probably two hands maliciously poised over a keyboard in front of a computer screen with green Matrix-like text scrolling down, right? That’s because you’ve been fed a steady diet of cheesy stock photos from media outlets left without a better way to visually represent cyber threats.
But there’s a completely different kind of hacking that you — and the company you work for — may not be adequately prepared to combat: visual hacking.
Let me present you with two hacking scenarios. You tell me which one would be easier for a thief to pull off (even an relatively unskilled, non-techie thief for that matter).
Scenario one: a hacker develops a virus which infects thousands, or even millions of computers across the globe, enslaving them as part of a nefarious network known as a botnet. The hacker uses the combined computing power of their new network to attempt to crack your company’s digital security using a brute force (random password guessing) attack. This takes several hours or days and may or may not be blocked, either automatically or manually, by a savvy IT department.
Scenario two: a hacker uses their own smartphone to record you entering ...