Date First Published: 19th May 2023
Topic: Cybersecurity
Subtopic: Threats To Systems, Data & Information
Difficulty: EasyDifficulty Level: 3/10
Learn more about what shoulder surfing is in this article.
Shoulder surfing is the practice of looking over someone's shoulder to steal their sensitive information, including password, card numbers, and PIN numbers. Shoulder surfing can be done by directly looking over someone's shoulder within a short distance or within a long distance by using binoculars or other vision-enhancing devices.
Shoulder surfing allows an attacker to physically view the device screen to obtain personal information and requires them to be nearby to the target. They will often wait until the target is rushing or unaware of their surroundings. Shoulder surfing is becoming a common tactic to steal confidential data as no technical skills or deception tactics are required.
Below are three examples of shoulder surfing:
Shoulder surfing can happen in any public place, but it is more likely to happen in busy places because it is easier for the attacker to observe the target and blend in without being easily detected. Examples of busy places include:
The consequences of being a victim of shoulder surfing can be very serious. Attackers can steal usernames and passwords to gain unauthorised access to your accounts, access confidential data, and steal your financial information to commit bank fraud. Recovering from identity theft/fraud can take weeks, months, or even years, so prevention is much more important than recovery. Below are five steps you can take to prevent shoulder surfing.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection