Hackers have gotten much more creative over the years. From gaining control of smartphones that are offline to creating apps that download phishing software, hackers are using sophisticated methods to control your devices. If you’re concerned that your device might currently be infected with malware, or if you want to simply check on the security of your device, use the Security Scan feature to quickly check your phone for malware:
Read More: Your Phone Can be Hacked Even When It’s Offline
How Can Sound Waves Affect Your Phone?
Sound waves can affect your phone’s accelerometer. An accelerometer is a very small sensor in your phone that helps it to detect movement. This is useful when you’re tilting your phone or counting your steps, for example. Even from a distance, these sensors can be tricked into sensing a fake motion signal. Essentially, if hackers find the right frequency to affect the sensor, the accelerometer will read data that isn’t true to life.
Has This Hack Been Reported in the Real World?
Not yet. Only researchers in labs have been able to exploit the sensors’ vulnerabilities. But in the labs, scientists have been able to manipulate the sensors in many different devices. For example, the researchers took over a music file to make a smartphone add the word “Walnut” to its accelerometer readings and took over an app involving a toy car.
How Can Hackers Use This Technology?
Even if you don’t care if hackers add extra steps to your Fitbit, the technology has serious consequences in the real world, especially as we link more and more devices to our smartphones. For example, if shaking your phone were linked to your car’s engine starting up, hackers could start your car remotely. Think about what this would mean on a large scale.
Right now, scientists and policy makers are still considering the implications of these findings. As of now, we don’t necessarily have the features on our phones that could make the hack detrimental. Manufacturers will certainly have to secure these sensors as we connect our smartphones to more and more important objects and devices.
Learn all about one of the hackers' favorite breach method and keep your company safe…
Have you ever wondered how to recover deleted photos on Android? After all, the lack…
Digital worms are among the most serious threats in the wild kingdom of the Internet.
Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…
Five Steps to Reduce QR Code Risk! Step one? Read this article…
Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…