Hack smartphone password via touch screen sound
According to Business Insider, microphones in handheld devices can be used by malware to steal users' passwords and PINs.
According to researchers at Cambridge University in England and Linköping University in Sweden, this stealing technique is based on machine learning technology. Test results showed that malicious software can correctly guess more than half of the four-digit PIN used on Android tablets.
This shows that sound on smartphones and tablets can become the new target of attacks.
How does an attack technique based on sound waves and microphones take place?
Users will create sound waves when they touch the screen of smartphones and tablets. Currently, most modern handhelds have many micrometers to use for many different activities such as voice calls, for voice recording, voice memo .
Researchers have created a software that can be based on where the sound is coming from on the screen, the difference can be measured by the fraction of seconds, to give the predicted key that the user typed.
After 10 attempts, the system can correctly guess 73% of four-digit passwords. With a password of between seven and 13 characters long, it can determine exactly 30% after 20 attempts.
To exploit the vulnerability researchers found, hackers had to install malware on the phone and get permission for the software to access the device's microphone from the user.
In fact, this is very unlikely because most current operating systems do not allow applications that use the device's microphone unless the user agrees.
You should read it
- The US seeks to abandon the use of passwords
- 3 ways to display passwords *** on the browser is extremely simple
- Americans are banned from using password 1234 to ensure safety
- Summary of how to create strong passwords and manage the most secure passwords
- Watch out for phishing attacks that can steal Apple ID passwords very hard to detect
- Detecting a new type of malware that steals Windows passwords, installs a virtual currency mining tool and continues to spread trojans
- What is the smartest and safest way to store passwords?
- This is a list of the most common passwords found in cyber security breaches 2019
May be interested
- Privacy is Apple's most advanced productapple also sells another extremely expensive feature for all of us - privacy.
- NASA opens the entire library of photos, videos and audio for free, anyone can seenasa just has a move that makes space enthusiasts extremely happy that they have opened the entire research library for everyone to access, including 140,000 photos, a series of videos and audio.
- 3 hidden features will be found in the next version of Windows 10on june 5, microsoft officially released windows 10 insider preview 20h1 build 18912 for users in fast rings, along with three new features hidden in this operating system, and likely to be released. into the next build.
- JC-B1 - The device turns old iPhone battery into new onejc programmer jc-b1 made in china can bypass the ios operating system to display incorrect information on iphone, turn a low battery health indicator battery into 100%, deceive users.
- New update 3uTools supports iOS 13 beta 1 upgrade for Windows computersthe 3utools tool has just been added by the development team to help users to flash ios 13 firmware (beta 1) without installing xcode 11 (beta) software or owning a mac (running in the background). macos 10.15).
- Why is Xiaomi machine with high configuration but still cheap?to get the high-profile smartphones, cheap prices, xiaomi had to sacrifice what on his smartphone, we will find out.