Input/output (I/O) devices are major attack vectors. Where interactions occur so can attacks. Wireless I/O, especially a popular implementation like Bluetooth, can allow unintended parties to meddle directly with the communications you send and receive with a system. Radio frequency-based I/O devices are the most vulnerable, but others such as infrared and proprietary implementations can be just as vulnerable. Unfortunately, this is not getting better. Technological advances mean that as RF devices get more powerful, their range increases, as well as the length of their attack vector.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook

Post a comment