we do Not want food in you foolish paranoia, but unfortunately this article is talking about how the list of technological devices that definitely does not allow anyone to spy on you is becoming rather short. The last article to be struck out were the headphones: a group of israeli researchers has found a way to turn them into microphones with which to record everything that you say thanks to a malware called “Speak(to)r”.
As shown in the video below, in this way, you can record the audio environment around the headset even when the microphone is turned off, or was even removed: the most disturbing thing is that in this way the speaker in the headset become microphones.
READ ALSO: 6.000 shops online struck by hackers to steal credit card data
As you know, anyone with some knowledge of electronics is not a novelty that the headset can be used as microphone: as explained in a study available on the Arxiv, researchers have thought to use the thing by recording the audio (input) even if the device is connected via a power output.
researchers have used a little-known special feature of the sound codec chip RealTek with a pair of Sennheiser headphones: “The Realtek chip are so common that the attack works on virtually any desktop computer, whether you’re using Windows or MacOS, and also on the most laptops”, explained the scientists in the Wired.
The most worrying is that, according to the researchers, it is likely that it is possible to hack in the same way also the headphones that use sound codec chip different, which would require a redesign and replacement in the current and upcoming devices in order to avoid that the problem persists in time.
indeed, many of the technological objects that practically all we have in the house and that, as shown by this latest research, can be hacked to both of you in some way. Taking into account that in the future the situation may even get worse, let’s see what are the 5 objects that you put at risk that someone intrufoli in your life.
1) the COMPUTER
it can Seem trivial, but they are still more frequent cases in which hackers are able to do disasters in the life of a person violating the computer. Very often operations imprudent (not to update the antivirus, choose passwords that are too simple and always the same for all internet services, etc.) can lead to serious consequences if an attacker decides to pick us as a target.
2) SMARTPHONE
in many ways, using a smartphone, we’re even more vulnerable than with a computer: for example, try to do a survey on how many of your friends to know that you can (and should) install an antivirus on your phone. Some time ago we talked about how Google knows literally everything of you. Among the data that the Big G collects with your smartphone there is, the one corresponding to your location: maybe Google will do nothing with this information, but perhaps an attacker who knows that you are on vacation something bad might come to mind.
3) WEBCAM
READ ALSO: Hackers can spy on users through the webcam: hit the MacBook and the iMac
Even one such as Mark Zuckerberg, who as the password for almost all of his accounts on the social network (excluding Facebook), has selected the password “dadada”, know that the webcam, both external ones and those integrated in laptops, are hackerabili without too much difficulty and that can be used for the purposes of a decidedly illegal: do like Zuck, and cover it when not in use.
4) household APPLIANCES
The future of technology, almost all are in agreement on this, is the Internet of Things, otherwise known as the Internet of Things, or simply IoT appliances and systems, management of the home (burglar alarm, air-conditioning, opening and closing doors, etc.) connected between them and, thanks to the network, also to the legitimate owner of the house. The problem is that security experts increasingly warn against the risks inherent in having so many “gates” ready for the bad guys who would like to tuck in to our home network through Wi-Fi.
5) WIRELESS KEYBOARDS AND mice
keyboards and wireless mouse can be very comfortable and, let’s tell the truth, give the impression of being super hi-tech. The problem is that they are devices that facilitate the access an attacker within range of our wireless network. In addition, except that the information exchanged with the computer are not encrypted, it is very difficult to defend against this problem. Which in turn means that a hacker could know what you are typing at any time, including your precious passwords.
No comments:
Post a Comment