Linked by Thom Holwerda on Sat 1st Aug 2009 18:22 UTC
Apple Almost everything has a processor and/or memory chips these days, including keyboards. Apple's keyboards are no exception; they have 8Kb of flash memory, and 256 bytes of RAM. K. Chen has found a way to very easily install keyloggers and other possibly malicious code right inside these Apple keyboards (more here). Proof of concept code is here as well.
Permalink for comment 376532
To read all comments associated with this story, please click here.
RE[2]: Leave it to Apple
by sbergman27 on Sat 1st Aug 2009 19:57 UTC in reply to "RE: Leave it to Apple"
sbergman27
Member since:
2005-07-24

What we need to know is this: how hard is it to achieve this on keyboards from other manufacturers?

Even if it were possible (and I suspect this is going to turn out to be Apple specific) the exploit would surely need to be customized for the keyboard family. And for the platform.

Apple would still be the logical target because MacOSX and Apple keyboards go together like... oh... "War" and "Pestilence". If the exploit code will run, you can be reasonably certain that the keyboard is going to be Apple, and thus vulnerable, most of the time.

Note that this reasoning applies to any future hardware-based exploits, and not just to keyboards.

Edited 2009-08-01 20:06 UTC

Reply Parent Score: 3