Shoulder Surfing


Lookout For Shoulder Surfing When Entering Sensitive Data.

When you read or hear on the news, that hackers and the like have compromised and obtained a given user's sensitive credentials, I'd say It's safe to assume that your first Impression, Is that It was done by Infecting their computer with a virus. Or In the case of social engineering, simply SEing the target and grabbing their details thereafter.

Whilst this Is certainly true In Its entirety, by no means Is It the only way to obtain such Information. Social engineers have been using what's called "shoulder surfing" for as long as I can remember, and provided the target/victim Is physically present, It's a very effective way to grab (for example) a person's username & password without even touching their device, nor any form of communication with the victim. So let's have a look at what "shoulder surfing" Is all about.

Read the entire article In a PDF file, by using any of the direct links below.

Direct Link Solidfiles:
Direct Link Mega:
Direct Link Mediafire:
Direct Link Hostr:
Direct Link Sabercathost:
Direct Link UFiles: