logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
23rd February 2018 by CyberVision 0 Comments 1158 Views
23rd February 2018 by CyberVision in Business Security

What is an Evil Maid attack?

An evil maid attack is a security exploit that is characterised by the attacker’s ability to physically access a computing device that has been left unattended. As far-fetched as this analogy sounds, the rate at which attacks like these occur makes this term more real.

You’re on location for a meeting and check into a hotel for this business trip. Leaving your belongings in your hotel room is a no-brainer and pay no mind to the safety of your belongings. A competitor or anyone with a malicious motive enters your room while you’re away without anyone’s knowledge or consent and manually copies your entire drive while planting a virus onto your device simultaneously.

 

Evil maid attacks are one of the hardest things to defend your network against. You can encrypt your laptop or any other device, but the “maid” could predict and counter that with a password catching virus that may have been planted on your device. You can run anti-virus software to identify and destroy the infection, but you have to type in your password before you can run the scan. This is just an example of why it is that much harder to protect your network from someone who has physical access to your device.

These are all extreme cases, but if you just want to ensure that your data is secure at home or when you’re travelling, have a look at the following tips:

 

  • Never leave your unlocked device unattended.

Build up your discipline by being extremely diligent about this.

 

  • Shut down your laptop or PC when you’re done with it.

An attacker has less opportunity to execute certain classes of hacks with a fully shut down device.

 

  • Consider full disk encryption.

An encrypted disk limits the hacker from tampering with its contents and returning it to its source undetected.

 

An encrypted device that has been locked with a secure password and shut down correctly will be secure from anyone, except the malicious “evil maid”.

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • attacks
  • cybersecurity
  • evil made
  • f-secure cyber security
  • hackers
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo