Phishing and shoulder surfing
clearly fit under the human issues as described by Beznosov and Beznosova (2007).
Thus we design and developed a Pattern based mutual Near Field Proximity Authentication (NFPA) for safe and secure data dissemination eliminating MITM and Shoulder Surfing
Attacks in insecure public networks between peer devices using QR Code Technology.
One weakness for this type of GUA having is the shoulder surfing
With the advent of smartphones & tablets by employees in enterprises, they will need to address the issue of shoulder surfing
(n): The peculiar tendency for people to watch over your shoulder or stand really close to you in an ATM queue (when a queue happens to form that is).
However, even with conventional privileged password management, it is still possible to access local passwords through key loggers, shoulder surfing
, social engineering, software debuggers, and similar attacks.
As someone was withdrawing cash, one of them would lean over to watch them entering their PIN, a crime known as shoulder surfing
Jim seems to be a victim of shoulder surfing
- a form of card fraud where criminals look over your shoulder, watch you enter your PIN then steal your card later and empty your account.
( Looking over the shoulder of a person entering a personal security code.
Researchers at Rutgers University--Camden are working on a graphical password that prevents shoulder surfing
For example, corporate espionage techniques ranging from shoulder surfing
to eavesdropping on instant messages sent across an unencrypted wireless network in a coffee shop allow attackers to aggregate enough confidential company information to cause great damage.
If there's anybody behind me in the queue then I'm out of there in case they're shoulder surfing