Tag

Shoulder Surfing Attack

Explore how shoulder surfing attacks occur when malicious actors visually observe screens, keyboards, or devices to steal passwords, PINs, and sensitive data. This tag covers real-world scenarios, prevention techniques, and privacy tools that help individuals and organizations defend against this low-tech but highly effective social engineering threat.

posts

Shoulder Surfing Attack

Shoulder Surfing Attack: The Low-Tech Threat You Ignore

A former employee at a financial services firm in Chicago watched his coworker type her password every morning for two weeks. He memorized it character by character. After he was terminated for performance issues, he used those stolen credentials to access the company's client database from a public

Carl B. Johnson Oct 10, 2020 7 min read