Eavesdropping Attack

Eavesdropping Attack

An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device. The passwords for these public networks are readily available, so an eavesdropper can simply log on and, using free software, monitor network activity and steal login credentials along with any data that other users transmit over the network. An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device. (Some reported incidents that make it appear that the companies carried out the snooping themselves appear to have been accidents caused by mistakes in speech recognition.) Another way to limit your vulnerability to an attack is to make sure your phone is running the most recent version available of its operating system. Eavesdropping attacks can be prevented by using a personal firewall, keeping antivirus software updated, and using a virtual private network (VPN). Using a strong password and changing it frequently helps, too.

Avoid public wi-fi networks.

What Is an Eavesdropping Attack?

An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device.

The attack takes advantage of unsecured network communications to access data as it is being sent or received by its user.

Eavesdropping is a deceptively mild term. The attackers are usually after sensitive financial and business information that can be sold for criminal purposes. There also is a booming trade in so-called spouseware, which allows people to eavesdrop on their loved ones by tracking their smartphone use.

Avoid public wi-fi networks.
Keep your antivirus software updated.
Use strong passwords.

Understanding the Eavesdropping Attack

An eavesdropping attack can be difficult to detect because the network transmissions will appear to be operating normally.

To be successful, an eavesdropping attack requires a weakened connection between a client and a server that the attacker can exploit to reroute network traffic. The attacker installs network monitoring software, the "sniffer," on a computer or a server to intercept data as it is transmitted.

Amazon Alexa and Google Home are vulnerable to eavesdropping, as are any internet-connected devices.

Any device in the network between the transmitting device and the receiving device is a point of weakness, as are the initial and terminal devices themselves.

How to Foil an Eavesdropping Attack

Eavesdropping attacks can be prevented by using a personal firewall, keeping antivirus software updated, and using a virtual private network (VPN).

Using a strong password and changing it frequently helps, too. And don't use the same password for every site you log onto.

Public wi-fi networks such as those that are available free in coffee shops and airports should be avoided, especially for sensitive transactions. They are easy targets for eavesdropping attacks. The passwords for these public networks are readily available, so an eavesdropper can simply log on and, using free software, monitor network activity and steal login credentials along with any data that other users transmit over the network.

If your Facebook or email account has been hacked lately, this is probably how it happened.

Virtual Assistants Can Be Spied Upon

Virtual assistants such as Amazon Alexa and Google Home also are vulnerable to eavesdropping and their "always-on" mode makes them difficult to monitor for security.

(Some reported incidents that make it appear that the companies carried out the snooping themselves appear to have been accidents caused by mistakes in speech recognition.)

Avoid Dodgy Links

Another way to limit your vulnerability to an attack is to make sure your phone is running the most recent version available of its operating system. However, its availability is up to the phone vendor, who may or may not be efficient about offering the update.

Even if you do all of the above, you have to be careful from day to day. Avoid clicking on dodgy links. The sites they link to may install malware on your device. Download apps only from the official Android or Apple stores.

Related terms:

Cloud Security

Cloud security protects data and online assets stored in cloud computing servers on behalf of their client users. read more

Cybersecurity

Cybersecurity refers to the measures taken to keep electronic information, as well as hardware and software, private and safe from damage or theft. read more

Enterprise Mobility Management (EMM)

Enterprise Mobility Management (EMM) is the organization and management of mobile devices used in enterprise mobility. read more

Firewall

A firewall is a legal barrier separating banking and brokerage activities in full-service banks and between depository and brokerage firms. read more

Phishing

Phishing is a method of identity theft carried out through the creation of a fraudulent website, email, or text appearing to represent a legitimate firm. read more

Smart Home

A smart home is a home setup where internet-enabled appliances and devices can be automatically controlled remotely using a networked device. read more

Smartphone

Smartphones are handheld devices that enable people to make phone calls, send text messages, and access the Internet. read more

Software-as-a-Service (SaaS)

SaaS or software-as-a-service uses cloud computing to provide users with access to a program via the Internet. Discover the pros and cons of SaaS.  read more