Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpgThese days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

This exploit can use Siri and Google Now to perform any number of actions using your mobile device. The hacker can silently issue commands to devices that have headphones plugged in, acting as a receiving antenna. For example, the headsets that business owners love to use to communicate while out and about could work for this exploit. The headphones antenna acts like an FM radio chip that can communicate with mobile devices.

ZDNet explains further how this particular exploit works:

With the open source GNU Radio software on a laptop, electromagnetic signals can be sent to those devices. Depending on the sent command, Siri or Google Now can be told to open up a website, send a text, place a call or do any other number of things.

In order to pull this hack off, the attacker only needs to use a laptop with some sort of antenna apparatus to broadcast the signal. All of this could easily be concealed in a backpack and taken on the move. Granted, this exploit is also dependant on whether or not users will leave headphones plugged into the device when not in use, which is relatively unlikely.

Researchers further explained that this hack can work from around six feet from the phone, meaning that the hacker still has to get somewhat near the victim. Furthermore, the signal could potentially extend up to 16 feet from the victim, if the hacker has a powerful enough battery and antenna. Of course, this kind of powerful equipment isn’t nearly as portable as a laptop, making it somewhat inefficient to use, despite the further range.

Finally, it’s very likely that users will notice that their devices are being tampered with before the hacker manages to do anything fishy. The hack doesn’t disable the display of the device, so anyone who is currently using their device will notice what’s happening and react to it, hopefully. These types of hacks are one reason that you should always practice proper smartphone security and use a lock screen. It’s not known if this trick can bypass the lock screen, but either way, it’s a best practice to always be using one. You never know who could get into your device if you’re not using it, especially if you lose it or it gets stolen in a public place. This is why you need some sort of login credential for your device, just like you would for your laptop or desktop PC.

What are your thoughts on this new exploit? Do you think there’s a chance that this kind of vulnerability could be a threat to the business world, or do you think there’s little chance of it having any practical use? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Data Recovery Office Passwords Windows 10 Gadgets Tech Term Chrome Virtualization Social Media Saving Money Holiday Microsoft Office Automation Managed IT Services Managed Service Operating System Artificial Intelligence Facebook Computers Cybercrime IT Support Wi-Fi Hacking BYOD Health Mobile Device Management Internet of Things Networking Spam Alert Managed Service Provider Office 365 Telephone Systems Remote Information Technology Covid-19 Information Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Remote Monitoring Big Data Password Money App History Encryption Mobile Computing Applications Data Breach Application Human Resources Law Enforcement Mobile Office How To Managed IT Apps Office Tips Data Storage Patch Management Training VPN Blockchain Paperless Office Government Remote Computing Private Cloud HaaS Infrastructure Voice over Internet Protocol Bring Your Own Device Data Management Work/Life Balance Wireless Flexibility Vulnerability Marketing Windows 7 Word Gmail WiFi Google Drive IT solutions Settings Entertainment Website Servers Budget Two-factor Authentication Avoiding Downtime Data Security Mouse RMM User Error Save Time Meetings Cleaning Risk Management Hacker Data Protection Conferencing End of Support The Internet of Things Education Physical Security Lithium-ion battery Scam Safety Sports HIPAA Redundancy Vendor Vendor Management Firewall Keyboard Managed Services USB Telephone System Staff Software as a Service Display Machine Learning Virtual Reality Apple Connectivity Remote Work Employee/Employer Relationship Social Wireless Technology Samsung Identity Theft Solid State Drive How to Downtime Computing Value Data storage Wearable Technology Automobile Augmented Reality Spam Blocking Electronic Medical Records Hard Drives Fraud Retail Instant Messaging Digital Signage Remote Worker Robot Computing Infrastructure Excel Hiring/Firing Going Green Cryptocurrency Biometrics Virus Virtual Desktop Unified Threat Management Battery Procurement Shadow IT Comparison Net Neutrality Computer Accessories DDoS Workplace Strategy Legal Business Intelligence SharePoint CES Help Desk Internet Exlporer Worker Audit Printing IT Management Business Technology Content Management Printer Botnet Customer Service PDF Access Control IT Plan Environment Managed Services Provider Bluetooth Virtual Assistant Proactive IT Database Fax Server Authentication Unsupported Software Remote Workers Best Practice YouTube Charger SaaS Black Market Processor IT Consultant Compliance Update Computer Care OneNote Network Congestion Current Events Hard Drive Humor Google Docs eWaste Document Management Telephony Devices Copiers Tablets 5G Administrator Root Cause Analysis HBO Enterprise Content Management Quick Tip Entrepreneur Knowledge Music Smartwatch Consultant Skype MSP Ergonomics Files Accountants Thought Leadership Development Chromecast Credit Cards OLED Analytics Microchip Shortcut Data loss Outlook Password Management PCI DSS Cost Management Leadership Password Manager Virtual Machine Troubleshooting Multi-Factor Security Employee Best Available Start Menu 2FA Social Networking Colocation Fiber Optics Uninterrupted Power Supply Twitter Messaging Loyalty Cabling WIndows 7 Search Engine Screen Mirroring Frequently Asked Questions NIST Policy Monitor Business Mangement Hypervisor Books Trending Running Cable Mobile Dark mode Windows 10s Smart Tech Trend Micro Cast Addiction SMS Memory Amazon Default App Tip of the week Procedure Reputation webinar Recycling Saving Time Streaming Media Emergency Tech Support Employer Employee Relationship Google Search Content Professional Services Wiring dark theme Public Cloud Practices Shopping Techology Cache AI Laptop Assessment Amazon Web Services IT Infrastructure User PowerPoint Windows Media Player Windows Server 2008 Safe Mode FinTech Customers Criminal Bing Science Audiobook Tools GDPR Hosted Computing Social Network Wireless Internet Touchpad Television Online Shopping Investment Managing Stress File Sharing Employees Employee/Employer Relationships Specifications ISP Cameras Distributed Denial of Service Politics Camera Windows 365 Customer Relationship Management Advertising Inventory Wire Video Conferencing Analyitcs Public Computer Evernote ROI Regulations Sales Programming Bitcoin Notifications Transportation Travel Shortcuts Rootkit Millennials Cryptomining Printers Point of Sale Computer Fan Personal Smart Office Supply Chain Management Wireless Charging Antivirus Monitoring Relocation Workers Batteries Benefits Windows 8 Workforce Printer Server Virtual Private Network Windows 8.1 FENG Digitize IT service Video Games IBM Cables Windows Server 2008 R2 Worker Commute Flash Customer relationships Smart Technology Tablet Telecommuting Manufacturing Experience Project Management Email Best Practices Nanotechnology IT Assessment Domains Scalability Software Tips Supercomputer Cortana Business Owner Sync Computer Tips Emails Digital Signature Managed IT Service Security Cameras OneDrive NarrowBand Biometric Security IaaS Warranty Virtual CIO Maintenance Search HVAC Peripheral Bloatware Google Apps Digital Security Cameras iPhone Netflix Analysis Using Data Two Factor Authentication

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code