USD
41.53 UAH ▼0.07%
EUR
48.02 UAH ▲1.07%
GBP
56.32 UAH ▲0.35%
PLN
11.23 UAH ▲0.52%
CZK
1.94 UAH ▲0.95%
To spread: Hacker attacks are becoming more and more sophisticated. For example,...

No one would think: hackers can attack you because of a completely unexpected gadget

To spread: Hacker attacks are becoming more and more sophisticated. For example, a "smart clock" - a gadget that does not cause suspicion at all. The vulnerability was revealed by Ben-Gurion University Safety in Negev (Israel), Techxplore. com writes. Experts have found evidence that with a smart watch can be penetrated into an isolated computer system. Computers or computing systems with air gap are specially invented in order to work physically remotely from the online networks.

In this way, they are protected from distant hacking. It would seem the only way to break such a computer or system is to get direct physical access or ask someone about it. It turned out to be different. The fact is that the smart watch has all the functions required to listen to ultrasonic signals from an isolated computer, starting with the microphone. They can also be used to process signals or to route them on a speaker or a Wi-Fi device that can be broadcast on a more sophisticated device.

Data can be broadcast at ultrasonic frequencies at a distance of about 6 meters at a data rate up to 50 bits. That is, theoretically hacker can access the computer and install a malicious software that will broadcast information that is easier to decipher. Then ultrasonic signals from an isolated computer can be intercepted by a person nearby and wears a smart watch. This approach may include a sleeping harmful software that is only activated when a hacker is nearby.

The attackers can steal the smart watch, download it with harmful software, and then secretly return to the user who does not suspect anything. However, it will be difficult to put this method in practice - hacker will still have to get closer to the target computer or system, and, moreover, to go unnoticed. Earlier, focus wrote that hackers can break your computer without the Internet. For example, malefactors can use ultrasound and gyroscopes, or diodes on a network card.