Bad news for all computer owners out there. A newly released Raspberry Pi-based device can hack into your computer and steal all your data, and there’s nothing you can do to prevent it.
The new diabolical device is called PoisonTap and, once hooked up to a computer, it can create a backdoor in a matter of seconds, making your device vulnerable to hackers. However, that’s not the worst piece of news.
The device can be bought from anywhere on the Internet and it costs only $5. PoisonTap was designed by Samy Kamkar a security and online privacy expert and researcher in order to prove that no matter how strong your password is, there’s always a way for someone to bypass your PC’s security protocols and to steal your data.
So, how does the device really work? Because it is based on the Raspberry PI technology, the device is small enough to go undetected. PoisonTap is then hooked up to a computer via a USB connection. The device will then fool the PC into believing that an Ethernet device was installed.
Surely enough, your computer will start streaming data to the device’s microcontroller, and PoisonTap will begin siphoning your latest HTTP cookies. In addition, the device will also access your latest Alexa-related sessions.
According to Kamkar, the creator of PoisonTap, that the device is so powerful that not even two-factor authentication mechanism can’t do anything about it. As he explains, even though the device is removed from your computer’s USB port, the hacker can still access information stored on your computer through a remote connection.
However, there’s still a glimmer of hope. As PoisonTap’s creator explained, the injected agent needs the browser to keep running after the owner slammed shut the laptop’s lid.
So, what can we do to prevent our data from falling into the wrong hand? First of all, it’s recommended that we ensure that the browser app is closed before shutting the computer. It would be a good idea to kill the app from task manager.
Another good tip to keep in mind is to use the hibernate option as much as possible instead of sleep. Next, make sure you keep your cookies cache clear. Finally, use only HTTPS links instead of HTPP, and make sure that the secure flag option is enabled for your cookies.
Image source: Pixabay https://pixabay.com/p-1187192/?no_redirect