Eavesdropping

19th June 2020 | Cybrary Eavesdropping


eavesdropping cybrary term

Eavesdropping in the cybersecurity world refers to the interception of communication between two parties by a malicious third party (hackers). Eavesdropping is similar to a sniffing attack, where software applications allow a hacker to steal usernames and passwords simply by observing network traffic. This often happens on Public Wi-Fi networks where it is relatively easy to spy on weak or unencrypted traffic or by putting up a fake Wi-Fi network for unsuspecting users to connect to.

In all three situations, hackers are eavesdropping on your communications seeking to steal login credentials, and other sensitive information on a user’s devices. Eavesdropping also allows hackers to listen into VoIP communications as well. Eavesdropping is often conducted by deploying “Stalkerware” onto unsuspecting users devices, often by someone you know (family member).

Source: ECPI University

Additional Reading: How Hackers Use An Ordinary Light Bulb To Spy On Conversations 80 Feet Away

Related Terms: Password Sniffing, Packet Sniffing

What should you do as an SMB Owner?

SMB owners don’t need to learn what eavesdropping attacks are, but they do need to employ someone who does. Protecting your SMB from Eavesdropping means you need a vCISO or a security focused Managed Service Provider (MSP) or Managed Security Services Provider (MSSP) worrying about this for you. There are simple “ounce of prevention” measures you must take as a business owner which will proactively prevent the “pound of cure” reaction when something goes wrong.  Hackers are out there using Eavesdropping Attacks to break into your company. Proactively prevent this by leveraging a vCISO, CyberHoot, or both!

To understand the basics of Eavesdropping, watch this short 2 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more