Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpgThese days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

This exploit can use Siri and Google Now to perform any number of actions using your mobile device. The hacker can silently issue commands to devices that have headphones plugged in, acting as a receiving antenna. For example, the headsets that business owners love to use to communicate while out and about could work for this exploit. The headphones antenna acts like an FM radio chip that can communicate with mobile devices.

ZDNet explains further how this particular exploit works:

With the open source GNU Radio software on a laptop, electromagnetic signals can be sent to those devices. Depending on the sent command, Siri or Google Now can be told to open up a website, send a text, place a call or do any other number of things.

In order to pull this hack off, the attacker only needs to use a laptop with some sort of antenna apparatus to broadcast the signal. All of this could easily be concealed in a backpack and taken on the move. Granted, this exploit is also dependant on whether or not users will leave headphones plugged into the device when not in use, which is relatively unlikely.

Researchers further explained that this hack can work from around six feet from the phone, meaning that the hacker still has to get somewhat near the victim. Furthermore, the signal could potentially extend up to 16 feet from the victim, if the hacker has a powerful enough battery and antenna. Of course, this kind of powerful equipment isn’t nearly as portable as a laptop, making it somewhat inefficient to use, despite the further range.

Finally, it’s very likely that users will notice that their devices are being tampered with before the hacker manages to do anything fishy. The hack doesn’t disable the display of the device, so anyone who is currently using their device will notice what’s happening and react to it, hopefully. These types of hacks are one reason that you should always practice proper smartphone security and use a lock screen. It’s not known if this trick can bypass the lock screen, but either way, it’s a best practice to always be using one. You never know who could get into your device if you’re not using it, especially if you lose it or it gets stolen in a public place. This is why you need some sort of login credential for your device, just like you would for your laptop or desktop PC.

What are your thoughts on this new exploit? Do you think there’s a chance that this kind of vulnerability could be a threat to the business world, or do you think there’s little chance of it having any practical use? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Tech Term Saving Money Holiday Gadgets Social Media Chrome Virtualization Managed IT Services Automation Microsoft Office Managed Service Computers Facebook Artificial Intelligence Operating System Cybercrime BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Health Spam Office 365 Telephone Systems Covid-19 Information Technology Alert Managed Service Provider Information Remote Router BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Remote Monitoring Mobile Computing Application Law Enforcement App History Big Data Password Money Human Resources Data Breach Encryption Applications Government How To Office Tips Private Cloud Training Managed IT Data Storage VPN Patch Management Blockchain Apps Paperless Office Remote Computing Mobile Office Voice over Internet Protocol WiFi Data Security IT solutions Entertainment Website Budget Avoiding Downtime Wireless Gmail Vulnerability Bring Your Own Device Settings Data Management Work/Life Balance Windows 7 Word Two-factor Authentication Servers Flexibility Mouse Marketing HaaS Infrastructure Google Drive Sports HIPAA User Error Redundancy Meetings Keyboard Vendor Managed Services USB Display Risk Management Hacker Data Protection The Internet of Things Employee/Employer Relationship Save Time Lithium-ion battery RMM Conferencing Scam Cleaning Firewall Telephone System Staff Software as a Service Virtual Reality Machine Learning Apple End of Support Vendor Management Connectivity Remote Work Education Physical Security Social Safety Compliance PDF OneNote Computer Care Current Events Printer Proactive IT Augmented Reality Wearable Technology Telephony Bluetooth Managed Services Provider Retail Hard Drives Samsung Fraud Instant Messaging Database Best Practice YouTube Excel Remote Worker Robot Remote Workers Black Market Value Biometrics Cryptocurrency Electronic Medical Records Virtual Desktop IT Consultant Spam Blocking Processor Document Management Wireless Technology Humor Hiring/Firing DDoS Comparison Solid State Drive Hard Drive How to Downtime CES SharePoint Computing Data storage Content Management Automobile Business Technology Access Control Customer Service Business Intelligence Environment Virtual Assistant Computing Infrastructure Audit Going Green Worker Authentication Fax Server IT Management Digital Signage SaaS Botnet Battery IT Plan Virus Update Shadow IT Procurement Unified Threat Management Legal Workplace Strategy Network Congestion Unsupported Software Net Neutrality Computer Accessories eWaste Google Docs Internet Exlporer Charger Help Desk Identity Theft Printing MSP Accountants Sync Video Conferencing Emails ROI Shortcut Bitcoin Microchip Shortcuts Thought Leadership Credit Cards Sales Password Manager Point of Sale Personal Relocation Cost Management Cryptomining Password Management Two Factor Authentication Multi-Factor Security Supply Chain Management Social Networking Netflix Video Games Root Cause Analysis Batteries Search Engine Twitter Monitoring Business Mangement Windows 8.1 Worker Commute HBO Digitize Knowledge Printer Server Music NIST Smart Tech Experience Running Cable Trending Skype Windows Server 2008 R2 Scalability Data loss Memory Addiction Amazon Customer relationships Recycling Email Best Practices Business Owner Outlook IT Assessment Leadership Manufacturing Troubleshooting NarrowBand Wiring Practices Start Menu Search Screen Mirroring Managed IT Service Loyalty Security Cameras Cache Amazon Web Services Computer Tips Criminal Virtual CIO Frequently Asked Questions OneDrive iPhone Biometric Security Books Safe Mode Science GDPR Hosted Computing Mobile Peripheral Windows 10s Cast Using Data Wireless Internet Online Shopping Digital Security Cameras Tip of the week Copiers Files webinar 5G Emergency File Sharing Chromecast Employer Employee Relationship Camera Inventory Distributed Denial of Service Specifications Professional Services Quick Tip Customer Relationship Management Public Cloud Ergonomics Analyitcs Consultant Assessment Smartwatch Wire Evernote Travel Windows Server 2008 Development Colocation Programming OLED Uninterrupted Power Supply Analytics Virtual Machine Printers Millennials Tools PCI DSS 2FA Fiber Optics Monitor Best Available Television Employee Smart Office Wireless Charging Antivirus Messaging WIndows 7 Cabling Hypervisor Windows 8 Virtual Private Network Workforce Policy Cables Dark mode IT service Trend Micro Reputation Public Computer Streaming Media Transportation Content Regulations SMS Default App Tech Support Computer Fan Saving Time Laptop Tablet Rootkit Project Management Nanotechnology Telecommuting Procedure Techology Cortana dark theme Domains Shopping Customers Google Search PowerPoint Benefits Windows Media Player Digital Signature Audiobook AI User Workers IT Infrastructure FENG Touchpad Warranty Bing IaaS FinTech Maintenance Google Apps Social Network Bloatware IBM HVAC Smart Technology Analysis Politics Flash Advertising Managing Stress Investment Employee/Employer Relationships Tablets Administrator Devices Employees Windows 365 Software Tips Entrepreneur Supercomputer ISP Notifications Cameras Enterprise Content Management

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code