Chat with Softimpact
+961 1 890 888
+961 1 890 999
Home
Profile
Services
WEB DESIGN & DEVELOPMENT
TAILOR MADE SOLUTIONS
SOCIAL MEDIA MARKETING
Mobile / TV Applications
THE WALL 360 CMS
WEB SERVICES
Cubix ERP/CRM
Portfolio
Recent
Websites
Mobile / TV Applications
Intranet Applications
Social Media
Branding
Facebook Applications
Highlights
Blogs
Clients
Quotation
Contact
FAQ
s
Careers
Menu
Hackers can use brainwave signals to steal passwords!
July 5, 2017
Hackers can steal passwords and PINs by analysing your brainwave signals, a new study has found.
Researchers from the University of Alabama at Birmingham and the University of California Riverside collected data from electroencephalography (EEG) headsets, which sense the electrical activity inside a person’s brain.
Users who paused a game but left their EEG headset on while checking their password-protected accounts could be vulnerable to hackers, the researchers found.
They asked 12 people to use a physical keyboard to type a series of randomly generated PIN numbers and passwords into a text box while wearing a headset.
After they had entered 200 characters, an algorithm created by the researchers was able to make educated guesses about the PINs with a 43.4 per cent success rate, and six-character passwords with 37.3 per cent accuracy.
“These emerging devices open immense opportunities for everyday users. However, they could also raise significant security and privacy threats as companies work to develop even more advanced brain-computer interface technology,” said Nitesh Saxena, one of the study’s authors.
Facebook is working on mind-reading technologies that would let you type words “directly from your brain”.
It’s an ambitious vision that has caused concern amongst privacy advocates, and the company has refused to confirm or deny if it will use people’s thoughts to sell ads.
"In a genuine assault, a programmer could encourage the preparation step required for the malignant program to be most precise, by asking for that the client enter a predefined set of numbers keeping in mind the end goal to restart the diversion in the wake of stopping it to take a break, like the way CAPTCHA is utilized to confirm clients when signing onto sites," included Saxena.
The researchers have called for EEG headset manufacturers to start disrupting the signals when a user is logging into accounts.
Back To Blogs
POPULAR ARTICLES
November 25, 2025
Instagram’s latest update now limits users to only three hashtags per caption. If you try to add more, a warning appears:
September 24, 2025
Google Launches Audio Summaries in Chrome
October 15, 2025
The Power of Paywalls: Why They’re Essential in Today’s Digital World
LET’S START A NEW PROJECT TOGETHER!
December 15, 2025
Digital Transformation Trends Businesses Can’t Ignore in 2026
2026 is set to be a pivotal year for businesses across Lebanon and the Middle East. Digital transformation is no longer a choice its the backbone of sustainable growth, operational efficiency, and longterm competitiveness. Organizations that invest...
Read More
December 09, 2025
Why Every Company Needs a Modern Intranet in 2026
in 2026, companies that invest in a modern intranet gain speed, security, and efficiency. Intranet transforms scattered communication into a unified, productive ecosystem that drives better results.
Read More
November 25, 2025
Instagram’s latest update now limits users to only three hashtags per caption. If you try to add more, a warning appears:
Instagrams latest update now limits users to only three hashtags per caption. If you try to add more, a warning appears:
Read More
November 13, 2025
Shape the Future With Us – Become Our Next Business Development Executive!
We dont just close deals, we create partnerships that shape the future. Ready to drive growth, build meaningful connections, and be part of the impact? Apply now!
Read More
October 17, 2025
Why Two-Factor Authentication (2FA) Is Crucial for Your Business Security
In todays digital world, cybersecurity is no longer optional its essential. Every business, regardless of size, manages sensitive data such as customer information, financial records, and internal communications. Unfortunately, passwords alone are...
Read More
Load More
Visit Our News