|
|
How a Hacker Can Break Into Your Laptop With Just an iPhone - TechAmok
How a Hacker Can Break Into Your Laptop With Just an iPhone - [security] 02:07 AM EST - Dec,23 2013 - post a comment That gentle hum of your laptop could be leaking your most sensitive documents. That's according to three of Israel's most respected cryptologists, who published a report this week outlining how they were able to extract data from a running laptop just by listening to the sounds it makes. Which only goes to show: No matter what you do–and no matter how serious your encryption–there will always be a way for a hacker to pilfer your data. Whether they do it over WiFi or bluetooth–and now via sound–your precious information is never truly safe. "Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components," write Adi Shamir, Eran Tromer and Daniel Genkin in their report, RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. "These acoustic emanations are more than a nuisance: they can convey information about the software running on the computer, and in particular leak sensitive information about security-related computations."
The three researchers tested the theory on a laptop with a 4096-bit RSA encryption–which, in layman's terms, is an incredibly tough code to crack. When the key to decrypt the code is entered into the computer, the computer runs a series of protocols to unlock the encrypted data, and the CPU makes a noise. The researchers then placed a mobile phone 30 centimeters from the target laptop, and pointed the phone's internal microphone towards the laptop's fan vents.
By parsing the sounds, the researchers proved a hacker could theoretically re-architect the encryption key, and later hack into the computer.
The whole attack could be packaged into a software "app" requiring no special hardware or knowledge. An attacker would install this software, reach physical proximity to the target computer under some pretext, and place the phone appropriately for the duration of the attack. For example, in a meeting, the attacker could innocuously place his phone on the desk next to the target laptop…and obtain the key by the meeting's end. Similar observations apply to other mobile devices with built-in microphones, such as tablets and laptops.
|
|
Add your comment (free registrationrequired)
Short overview of recent news articles |
|
Jan,30 2026 NVIDIA GeForce 591.86 WHQL Driver Jan,30 2026 iOS 26.3-Important New iPhone Location Privacy Feature Coming Soon Jan,29 2026 I Made the Ultimate Steam Machine Before Valve Jan,29 2026 Wardriver - Official Trailer (2026) Dane DeHaan, Sasha Calle, Jan,28 2026 Apple Intros Improved AirTag Jan,28 2026 US Version of TikTok off to Bumpy Start; Competitors Surge Jan,28 2026 Google Chrome no longer needs you, as Gemini takes the driving seat Jan,27 2026 Premium Subscriptions Coming to Facebook, Instagram, WhatsApp Jan,25 2026 Windows 11 Best For Gaming? Windows 11 25H2 vs. Windows 10 Jan,24 2026 Microsoft Says Uninstall This Windows Update Immediately (KB5077744 Jan,22 2026 Xbox Developer Direct Livestream 2026 | Fable, Forza Horizon 6, Jan,22 2026 Iridium Begins Testing its own Satellite Service for Phones Jan,22 2026 AMD Releases Adrenalin Edition 26.1.1 WHQL Drivers Jan,18 2026 AI in 2050 Jan,17 2026 iOS 26.2 Fixes Major Security Flaws Jan,17 2026 Google Links its AI to Your Gmail and Photos for "Personal Jan,17 2026 Fastest Koenigsegg v Fastest Bugatti: DRAG RACE Jan,17 2026 Creating a 48GB NVIDIA RTX 4090 GPU Jan,14 2026 CES was frickin weird, guys Jan,12 2026 Lee Cronin's The Mummy - Official Teaser Trailer (2026) Jack Jan,12 2026 Ferrari SF90 XX v Xiaomi SU7 Ultra: DRAG RACE Jan,10 2026 Welcome to the Wasteland - Fallout (American TV series) fan video Jan,09 2026 GOOD LUCK, HAVE FUN, DON'T DIE Trailer 2 (2026) Sam Rockwell Jan,07 2026 NVIDIA Releases GeForce 591.74 WHQL Drivers with DLSS 4.5 Support Jan,07 2026 Predator: Badlands Exclusive Deleted Scene (2025) Jan,06 2026 Greenland 2: Migration - Official Trailer 3 (2026) Gerard Butler, Jan,05 2026 The Best Laptops of 2025 - For Gaming, Creators & Students! Jan,05 2026 Punkt Updates its Privacy-Focused Smartphone Jan,05 2026 Clicks Launches New Ways to Add a Physical Keyboard to Your Life Jan,05 2026 Building a PC for the First Time Jan,03 2026 Building a PC in 2026 Jan,02 2026 I want this phone so bad... - Samsung Galaxy Z TriFold Jan,02 2026 The Real Finewine Strikes Again: Ryzen 5600X, 5700X & 5800XT Revisit Jan,02 2026 Nokia N8 Symbian Re-Awakened With Passion Jan,02 2026 Europe Forces Apple to Open up More of iOS Jan,02 2026 Must have Privacy and Security Tweaks: 2026 Edition Jan,01 2026 How Did RAM Get So Expensive?! Dec,31 2025 GeForce RTX 5090 prices to soar to $5,000 as NVIDIA and AMD prep GPU Dec,30 2025 Hacker arrested for KMSAuto malware campaign with 2.8 million Dec,29 2025 Killer Whale - Official Trailer (2026) Virginia Gardner, Mel
>> News Archive <<
| |
|