Wireless mice have become the preferred peripheral to scroll and click, and for most users, all they are really worried about is running out of battery at the wrong moment. But do these devices actually have a critical vulnerability? Could cutting the cord allow a hacker to take control of your computer?
On the latest episode of “Hackable?” we investigate whether Geoff’s wireless mouse is susceptible and just what kind of damage penetration tester Tim Martin can do with something called a MouseJack keystroke injection attack. Listen and learn if your most sensitive data is at risk!
Listen now to the award-winning podcast “Hackable?”.
“Hackable?” Puts Wireless Mice to the Test
More from Privacy & Identity Protection

This Holiday Season, Watch Out for These Cyber-Grinch Tricks Used to Scam Holiday Shoppers
Whether it be that their shoes are too tight, their heads aren’t screwed on just right, or they’re expressing a...Dec 11, 2024 | 7 MIN READ

How to Detect Signs of Identity Theft
When it comes to identity theft, if something doesn’t feel right, trust your gut. Follow up. What...Nov 26, 2024 | 9 MIN READ

How to Delete Yourself from the Internet
While you can’t delete your personal info from the internet entirely, you can take strong steps to...Nov 25, 2024 | 9 MIN READ

How to Protect Your Personal Info
It’s no exaggeration to say that your PII is the key to your digital life, along with...Nov 21, 2024 | 10 MIN READ

How to Protect Your Financial Data During Tax Season
W-2 phishing scams often involve emails that appear to be from the IRS or another official source,...Mar 13, 2025 | 7 MIN READ

Watch Out For IRS Scams and Avoid Identity Theft
It’s time to get those tax forms ready. But as users prepare to file, scammers prepare to take advantage of...Mar 11, 2025 | 6 MIN READ

AI chatbots are becoming romance scammers—and 1 in 3 people admit they could fall for one
It started with a DM. For five months, 25-year-old computer programmer Maggie K. exchanged daily messages with...Feb 11, 2025 | 4 MIN READ

Buying Tickets for Beyoncé’s Cowboy Carter Tour? Don’t Let Scammers Ruin Your Experience
Beyoncé has officially announced her Cowboy Carter world tour, and the excitement is through the roof! With...Feb 03, 2025 | 6 MIN READ

How to Make Sure Your Gmail Account is Protected in Light of Recent AI Scams
The rise of AI-driven cyber threats has introduced a new level of sophistication to phishing scams, particularly...Feb 03, 2025 | 4 MIN READ

Explaining DeepSeek: The AI Disruptor That’s Raising Red Flags for Privacy and Security
The artificial intelligence arms race has a new disruptor—DeepSeek, a Chinese AI startup that has quickly gained...Jan 30, 2025 | 5 MIN READ

How Scammers Steal Your Identity and What You Can Do About It
Identity theft is a growing concern, and Data Privacy Week serves as an important reminder to safeguard...Jan 30, 2025 | 5 MIN READ

Introducing Personal Data Cleanup
We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and...Jan 29, 2025 | 4 MIN READ

This Holiday Season, Watch Out for These Cyber-Grinch Tricks Used to Scam Holiday Shoppers
Whether it be that their shoes are too tight, their heads aren’t screwed on just right, or they’re expressing a...Dec 11, 2024 | 7 MIN READ

How to Detect Signs of Identity Theft
When it comes to identity theft, if something doesn’t feel right, trust your gut. Follow up. What...Nov 26, 2024 | 9 MIN READ

How to Delete Yourself from the Internet
While you can’t delete your personal info from the internet entirely, you can take strong steps to...Nov 25, 2024 | 9 MIN READ

How to Protect Your Personal Info
It’s no exaggeration to say that your PII is the key to your digital life, along with...Nov 21, 2024 | 10 MIN READ

How to Protect Your Financial Data During Tax Season
W-2 phishing scams often involve emails that appear to be from the IRS or another official source,...Mar 13, 2025 | 7 MIN READ

Watch Out For IRS Scams and Avoid Identity Theft
It’s time to get those tax forms ready. But as users prepare to file, scammers prepare to take advantage of...Mar 11, 2025 | 6 MIN READ

AI chatbots are becoming romance scammers—and 1 in 3 people admit they could fall for one
It started with a DM. For five months, 25-year-old computer programmer Maggie K. exchanged daily messages with...Feb 11, 2025 | 4 MIN READ

Buying Tickets for Beyoncé’s Cowboy Carter Tour? Don’t Let Scammers Ruin Your Experience
Beyoncé has officially announced her Cowboy Carter world tour, and the excitement is through the roof! With...Feb 03, 2025 | 6 MIN READ

How to Make Sure Your Gmail Account is Protected in Light of Recent AI Scams
The rise of AI-driven cyber threats has introduced a new level of sophistication to phishing scams, particularly...Feb 03, 2025 | 4 MIN READ

Explaining DeepSeek: The AI Disruptor That’s Raising Red Flags for Privacy and Security
The artificial intelligence arms race has a new disruptor—DeepSeek, a Chinese AI startup that has quickly gained...Jan 30, 2025 | 5 MIN READ

How Scammers Steal Your Identity and What You Can Do About It
Identity theft is a growing concern, and Data Privacy Week serves as an important reminder to safeguard...Jan 30, 2025 | 5 MIN READ

Introducing Personal Data Cleanup
We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and...Jan 29, 2025 | 4 MIN READ

This Holiday Season, Watch Out for These Cyber-Grinch Tricks Used to Scam Holiday Shoppers
Whether it be that their shoes are too tight, their heads aren’t screwed on just right, or they’re expressing a...Dec 11, 2024 | 7 MIN READ

How to Detect Signs of Identity Theft
When it comes to identity theft, if something doesn’t feel right, trust your gut. Follow up. What...Nov 26, 2024 | 9 MIN READ

How to Delete Yourself from the Internet
While you can’t delete your personal info from the internet entirely, you can take strong steps to...Nov 25, 2024 | 9 MIN READ

How to Protect Your Personal Info
It’s no exaggeration to say that your PII is the key to your digital life, along with...Nov 21, 2024 | 10 MIN READ