/?pid=12224

Updated:05:04 AM EST Jan 22


this is ggmania.com subsite How a Hacker Can Break Into Your Laptop With Just an iPhone - TechAmok

How a Hacker Can Break Into Your Laptop With Just an iPhone - [security]
02:07 AM EST - Dec,23 2013 - post a comment

That gentle hum of your laptop could be leaking your most sensitive documents. That's according to three of Israel's most respected cryptologists, who published a report this week outlining how they were able to extract data from a running laptop just by listening to the sounds it makes. Which only goes to show: No matter what you do–and no matter how serious your encryption–there will always be a way for a hacker to pilfer your data. Whether they do it over WiFi or bluetooth–and now via sound–your precious information is never truly safe. "Many computers emit a high-pitched noise during operation, due to vibration in some of their electronic components," write Adi Shamir, Eran Tromer and Daniel Genkin in their report, RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. "These acoustic emanations are more than a nuisance: they can convey information about the software running on the computer, and in particular leak sensitive information about security-related computations."
The three researchers tested the theory on a laptop with a 4096-bit RSA encryption–which, in layman's terms, is an incredibly tough code to crack. When the key to decrypt the code is entered into the computer, the computer runs a series of protocols to unlock the encrypted data, and the CPU makes a noise. The researchers then placed a mobile phone 30 centimeters from the target laptop, and pointed the phone's internal microphone towards the laptop's fan vents.

By parsing the sounds, the researchers proved a hacker could theoretically re-architect the encryption key, and later hack into the computer.

The whole attack could be packaged into a software "app" requiring no special hardware or knowledge. An attacker would install this software, reach physical proximity to the target computer under some pretext, and place the phone appropriately for the duration of the attack. For example, in a meeting, the attacker could innocuously place his phone on the desk next to the target laptop…and obtain the key by the meeting's end. Similar observations apply to other mobile devices with built-in microphones, such as tablets and laptops.


Add your comment (free registrationrequired)

Short overview of recent news articles

Jan,22 2026 Xbox Developer Direct Livestream 2026 | Fable, Forza Horizon 6,
Jan,22 2026 Iridium Begins Testing its own Satellite Service for Phones
Jan,22 2026 AMD Releases Adrenalin Edition 26.1.1 WHQL Drivers
Jan,18 2026 AI in 2050
Jan,17 2026 iOS 26.2 Fixes Major Security Flaws
Jan,17 2026 Google Links its AI to Your Gmail and Photos for "Personal
Jan,17 2026 Fastest Koenigsegg v Fastest Bugatti: DRAG RACE
Jan,17 2026 Creating a 48GB NVIDIA RTX 4090 GPU
Jan,14 2026 CES was frickin weird, guys
Jan,12 2026 Lee Cronin's The Mummy - Official Teaser Trailer (2026) Jack
Jan,12 2026 Ferrari SF90 XX v Xiaomi SU7 Ultra: DRAG RACE
Jan,10 2026 Welcome to the Wasteland - Fallout (American TV series) fan video
Jan,09 2026 GOOD LUCK, HAVE FUN, DON'T DIE Trailer 2 (2026) Sam Rockwell
Jan,07 2026 NVIDIA Releases GeForce 591.74 WHQL Drivers with DLSS 4.5 Support
Jan,07 2026 Predator: Badlands Exclusive Deleted Scene (2025)
Jan,06 2026 Greenland 2: Migration - Official Trailer 3 (2026) Gerard Butler,
Jan,05 2026 The Best Laptops of 2025 - For Gaming, Creators & Students!
Jan,05 2026 Punkt Updates its Privacy-Focused Smartphone
Jan,05 2026 Clicks Launches New Ways to Add a Physical Keyboard to Your Life
Jan,05 2026 Building a PC for the First Time
Jan,03 2026 Building a PC in 2026
Jan,02 2026 I want this phone so bad... - Samsung Galaxy Z TriFold
Jan,02 2026 The Real Finewine Strikes Again: Ryzen 5600X, 5700X & 5800XT Revisit
Jan,02 2026 Nokia N8 Symbian Re-Awakened With Passion
Jan,02 2026 Europe Forces Apple to Open up More of iOS
Jan,02 2026 Must have Privacy and Security Tweaks: 2026 Edition
Jan,01 2026 How Did RAM Get So Expensive?!
Dec,31 2025 GeForce RTX 5090 prices to soar to $5,000 as NVIDIA and AMD prep GPU
Dec,30 2025 Hacker arrested for KMSAuto malware campaign with 2.8 million
Dec,29 2025 Killer Whale - Official Trailer (2026) Virginia Gardner, Mel
Dec,28 2025 NVIDIA Showed Me Their Supercomputer
Dec,28 2025 2026 CPU Launches! AMD, Intel & NVIDIA: Buy Now or Wait?
Dec,27 2025 Disable this Windows Feature that Secretly Eats Up RAM!
Dec,27 2025 New Windows 11 vs Old Malware: Will it survive?
Dec,27 2025 Samsung TriFold Durability Test: We found the limit
Dec,26 2025 TRUST WALLET CONFIRMS SECURITY BREACH
Dec,26 2025 Xiaomi 17 Ultra Leads And Samsung To Follow With A 10 Percent Price
Dec,25 2025 Merry Christmas Gaming Insanity
Dec,24 2025 Battlefield 6 - Official PS5 Features Trailer
Dec,24 2025 NVIDIA GeForce Hotfix Driver 591.67 Released
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs