Shoulder Surfing

Shoulder Surfing

Shoulder surfing is a cybersecurity threat that involves an attacker secretly observing sensitive information such as passwords, PINs, or confidential data by looking over the victim's shoulder. This low-tech form of cyberattack doesn't require sophisticated tools but relies on human carelessness and lack of awareness.

How Shoulder Surfing Works

Shoulder surfing typically occurs in crowded or public spaces where individuals are using devices or entering confidential information. Here's how it works:

  1. The attacker positions themselves strategically to get a clear view of the victim's screen or keyboard.
  2. They discreetly watch as the victim enters their password, PIN, or other sensitive information.
  3. The attacker may use this information for malicious purposes, such as unauthorized access or identity theft.

Preventing Shoulder Surfing

Preventing shoulder surfing requires vigilance and awareness. Here are some tips to protect yourself:

Example of a Shoulder Surfing Attack

Let's walk through an example of how a shoulder surfing attack might occur:

Alice is at an airport and needs to access her bank account to check her balance. She goes to an empty corner of the terminal and takes out her smartphone to log in. Unbeknownst to Alice, Bob, an attacker, notices her from a distance.

Bob discreetly moves closer, positioning himself behind Alice so that he can see her screen. As Alice enters her PIN, Bob watches and memorizes it. With this information, Bob can later access Alice's bank account and potentially steal her money.