-
Tips for becoming a good boxer - November 6, 2020
-
7 expert tips for making your hens night a memorable one - November 6, 2020
-
5 reasons to host your Christmas party on a cruise boat - November 6, 2020
-
What to do when you’re charged with a crime - November 6, 2020
-
Should you get one or multiple dogs? Here’s all you need to know - November 3, 2020
-
A Guide: How to Build Your Very Own Magic Mirror - February 14, 2019
-
Our Top Inspirational Baseball Stars - November 24, 2018
-
Five Tech Tools That Will Help You Turn Your Blog into a Business - November 24, 2018
-
How to Indulge on Vacation without Expanding Your Waist - November 9, 2018
-
5 Strategies for Businesses to Appeal to Today’s Increasingly Mobile-Crazed Customers - November 9, 2018
Hackers can now attack smartphones through earphones
In order to hack into Siri or Google now remotely, the hacker must be within 16 feet of the phone in question. By sending radio waves that take over an iPhone Siri or Google Now voice command system, according to researchers at the French ANSSI network and information security agency. Additionally, the researchers suggest that if Apple and Google allowed users to set their own activation word like the Moto X does, hackers wouldn’t be able to activate Siri or Google Now, unless they knew your specific name or phrase. “Everything you can do through the voice interface you can do remotely and discreetly through electromagnetic waves”, at the recent “Hack in Paris” conference.
Advertisement
The exploit isn’t without limitations. The only way that a user can be a victim of this kind of attack is if their microphone-enabled headphones are plugged into the jack of their smartphone and have Siri or Google Now enabled. Still, the risk isn’t zero.
“The sky is the limit here”. Google Now voice control isn’t accessible from the lock screen by default, however Siri is.
If the equipment would have been bigger to fill a vehicle, The Verge said the estimated distance for it to work would be about 16 feet only. For one thing: Don’t leave headphones with a microphone plugged into your phone, and disable voice control enabled when the phone is locked. The hackers can for instance have Siri navigate to a certain web site and have malware installed via the page. On devices on which Google Now or Apple’s Siri digital personal assistants have been activated, the electrical signals could be modulated to generate a keyword command like “OK, Google” or “Hey, Siri”, and begin issuing commands to those devices.
“You could imagine a bar or an airport where there are lots of people”, says Strubel.
The attack uses the cable of the headphone as antenna to induce electric signals that Siri understands as voice commands. “We have seen hacks ranging from turning RAM chips into radios broadcasting air-gapped data to pita-sized radios stealing encryption keys to opening garage doors with a child’s toy”, said Craig Young, a security researcher at Tripwire.
Advertisement
The iPhone or Android users would notice the attack only if he or she looked at the screen – or after the fact, in case any traces are left. Researchers in France have shown that they can hijack your phone via those headphones with microphones, using the headphone wires as an antenna to pick up their malicious signals.