I have a number of wireless dongles that I use only with wireless mice. Many vendors use the same dongle chip for both keyboards and mice, and even though I purchased only "mouse dongle" sets, keyboard commands can still be sent to them. These devices run at 2.4 GHz, and are likely unencrypted.
Quite a few receiver dongles have been found to be susceptible to mouse-jacking by an interloper, where packets are sent to the receiver dongle from the interloper but coded as "keyboard" packets instead of mouse packets. This has been shown to allow for the injection of keystrokes, and was a big story in the news about eight months ago. I'd hate to throw these mice away and go back to the messy wired mice.
Does anyone know of a way to mitigate the problem by using some kind of fix on the operating system side of things, since the dongles themselves cannot be fixed?
Quite a few receiver dongles have been found to be susceptible to mouse-jacking by an interloper, where packets are sent to the receiver dongle from the interloper but coded as "keyboard" packets instead of mouse packets. This has been shown to allow for the injection of keystrokes, and was a big story in the news about eight months ago. I'd hate to throw these mice away and go back to the messy wired mice.
Does anyone know of a way to mitigate the problem by using some kind of fix on the operating system side of things, since the dongles themselves cannot be fixed?