Beware and Avoid Hacking Problem
It is a great apprehension in the mind of the users as to how hackers might take control of siri and google on your smartphone from some other distant places. What you need is stop these silent hacking elements which are in no way welcomed by any one. It sounds that every passing day we we that different research companies face and find vulnerabilities in the world’s leading mobile world. Actually the work in this connection is being done by the two security researchers on the part of the French government.They have found out a very wise way for hackers to get control of an iOS (an operating system used for mobile devices or Android device) by creeping and managing into the platform’s digital assistants, Siri and Google Now.
It is important to note that this technique of having access to the iOS or Android device is apparently much more technically modernized than simply tricking and compelling the mobile users to download a third-party application that has been extremely affected with malignant virus, malware or adware which not only creates hurdle in the function speed or harm the whole data. The most latest way of getting access to the device depends on the attackers who might surely be using the wire inside of a set of headphones to send electromagnetic signals via GNU Radio software directly from a laptop to the targeted mobile device. In fact, this method of access, which works from more than 16 feet away, and then allows commands to be sent to the mobile devices, and as a result it allows the attackers to tap into Siri or Google Now.
For your more information what happens:
i. It is necessary to note about the level of commands that could be issued to Siri or Now via this source of access is at present not known.
ii. But there’s no need for unnecessary argumentation that hackers could instruct Siri or Google Now to create and send text messages, invoke a phone call directly from the phone, or even visit a maliciously infected website through the Mobile Safari or Chrome browsers.
iii. What is the result of such methods? All of these methods of access could cause in the user’s device unknowingly telephoning a premium rate number or visiting a website designed to run malicious code remotely for extracting sensitive information from your personal data.
Why Is There Any Possibility of Such Access?
i. The reason of this issue of hacking is that the iOS or Android devices under discussion are only actually likely to be vulnerable to the attack when a set of headphones are connected to it.
ii. Another reason may be that those connected headphones must also be microphone-enabled in order for the command to be given.
iii. The important thing that is needed is to be met in order for the device to be hacked really curtails the possibilities of it happening to your device.
iv. Any provided command via GNU Radio means, that targeted devices would still show the Siri or Google Now interface alerting the user.
These findings about this topic of hacking would really be interesting as the researchers undertaking the task have presented their findings during a security conference and published a white paper on the topic electromagnetic attacks for those who wish to learn more. Click this link for the white paper here.
Notes and Meanings:
Google Now is an intelligent personal assistant developed by Google. Google Now is available within the Google Search mobile application for Android and iOS, as well as the Google Chrome web browser on personal computers.For your more information what happens:
i. It is necessary to note about the level of commands that could be issued to Siri or Now via this source of access is at present not known.
ii. But there’s no need for unnecessary argumentation that hackers could instruct Siri or Google Now to create and send text messages, invoke a phone call directly from the phone, or even visit a maliciously infected website through the Mobile Safari or Chrome browsers.
iii. What is the result of such methods? All of these methods of access could cause in the user’s device unknowingly telephoning a premium rate number or visiting a website designed to run malicious code remotely for extracting sensitive information from your personal data.
i. The reason of this issue of hacking is that the iOS or Android devices under discussion are only actually likely to be vulnerable to the attack when a set of headphones are connected to it.
ii. Another reason may be that those connected headphones must also be microphone-enabled in order for the command to be given.
iii. The important thing that is needed is to be met in order for the device to be hacked really curtails the possibilities of it happening to your device.
iv. Any provided command via GNU Radio means, that targeted devices would still show the Siri or Google Now interface alerting the user.
Notes and Meanings:
No comments:
Post a Comment