At first glance, a new hacking technique looks pretty scary. Using an attack that researchers at cybersecurity firm Bastille are calling "keysniffer," hackers can detect every key you press on your wireless keyboard.
That means they can pick up your passwords and maybe the answers to your security questions, like your mother's maiden name. The flaw affects keyboards manufactured by big names such as HP, Toshiba and General Electric. So far, bad news.
The good news? To use "keysniffer" on you, hackers would have to be pretty close. The attack works within 250 feet, which is about three-fourths the length of a football field. So international hackers aren't going to get you, and neither is anyone else who isn't in your physical neighborhood.
Like many vulnerable internet-connected devices, these keyboards are most at risk when someone with bad motives happens to be nearby -- or, more likely, has specifically targeted you. The same was true of flaws found in Hello Barbie, a doll that connects to Wi-Fi and learns to interact with its human friends.
Still, the reason your keyboard might be a touch vulnerable is disconcerting. The vulnerable keyboards are sending out each character you type over an unencrypted connection, according to Bastille researchers. That means the data flowing from your keyboard to your computer isn't scrambled, and it's no sweat for hackers to intercept and read.
Researchers from Bastille, led by Marc Newlin, said they tested low-cost keyboards from 12 manufacturers. In addition to keyboards from HP, Toshiba and General Electric (which licenses its name to manufacturer Jasco for keyboards), wireless keyboards from Kensington, Radio Shack, Anker, EagleTec and Best Buy's Insignia brand were vulnerable.
Denise Nelson, a spokeswoman for Kensington, said the company is working with Bastille on security issues. "They have taken all measures that they possibly can to close any security gaps," she said.
Nelson said new Kensington keyboards will feature an encrypted connection going forward. However, she did not know whether wireless keyboards already in use were still unencrypted. She added that the Kensington support team is ready to help customers resolve any issues.
Jasco is aware of the report from Bastille and "will work directly with its customers of this product to address any issues or concerns," the company said in a statement. Jasco is "committed to delivering secure products to its customers and would like to express its appreciation to Bastille Threat Research Group for reporting these issues."
The rest of the manufacturers named by Bastille did not respond to requests for comment. (Editor's note: Anker eventually responded; see update note at bottom of story.)
Bastille's website offers a list of the exact models affected.
"When we purchase a wireless keyboard we reasonably expect that the manufacturer has designed and built security into the core of the product," Bastille's Newlin said in a statement.
Update, 4:18 p.m. PT: A statement from Jasco has been added.
Update, July 28 at 11:12 a.m. PT: Anker sent the following statement on Thursday:
We are happy to inform that we haven't received any reports or complaints concerning this issue, to date; however, we have decided to take all necessary measures to ensure that our customers' privacy is protected. From today until August 30th, Anker will be offering all owners of the affected product a free exchange for one of our Bluetooth Ultra Compact Slim Profile Keyboards with rechargeable battery, provided it is still under warranty. To make the exchange, all they have to do is to contact our support team at firstname.lastname@example.org.
Additionally, we have decided to suspend sales of our Ultra Slim 2.4GHz Wireless Compact Keyboard indefinitely. Protecting the privacy of our customers is our top priority.