Researchers at the University of Alabama at Birmingham have discovered a new, subtle way for evildoers to take control of your smartphone: through ambient sound and light. Eep.
This isn't a hack so much as a trigger; for it to work, malware already has to be installed on your phone. But the research finds that, once certain kinds of malware is installed, it can be triggered or controlled with hidden messages, undetectable to humans, embedded within innocuous sounds or lights. Music, music videos, and light from the TV could call previously-installed malware to action or tell it what to do.
The method relies on one of the primary strengths of smartphones: they're always on, always connected, and always feeling around with audio and visual sensors. The researchers found that they could trigger malware with music from a distance of 55 feet, sending a brief message that the smartphone owner might not even notice, but that the phone certainly will.
Sharms Zawoad, who presented the paper recently at a conference in China, said "This kind of attack is sophisticated and difficult to build, but it will become increasingly easier to accomplish in the future as technology improves." The point of the paper is to bring attention to a possible weakness, so that future phones can have protection against this kind of trigger.
Read more over at the University of Alabama's site.
Every time you step within 55 feet of a Bieber song it bricks your phone... I like it.
Plot twist Apple and Google designed their devices that way, its not a bug its a feature.
Eventually the juvenile teen will down load and app that produces a signal or sounds to reprogram granny pace maker and the teen will tweak granny a bit and collect the inheritance sooner.
The trigger being some situation that the hacker may want to have his code run at? If the attacker knew of a some situation where two things happen at or near the same time. Maybe sound of a keypad being pressed to gain key. Sound of who knows what, phone dialing? It is a Trojan waiting to be launched on command/trigger.
Why would a hacker even bother with a trigger mechanism? If they were smart enough go get malware on your phone to begin with (or a user was gullible enough to install it), then they should already be all set to have limited or full control of your device.
Maybe it's just vigilante justice. Some hacker is just trying to save the world from it's bad habits like madonna and beiber.
uptil I saw the check which had said $8855, I did not believe that my friend was like they say actualy making money in there spare time from there computar.. there brothers friend has done this 4 less than 8 months and by now cleard the mortgage on their house and got a great Lotus Elan. read more at........ Fox85.com
Malware makes people assume that the virus is doing harm to the computer, causing the person money, or invading privacy. But malware can do other things, such as help build informational databases. I can send snippets of voice samples to a central database and start compiling that information. Imagine two suspected terrorists. The database has linked their voice to their identify. Now imagine the malware on the phone. It listens for other voices, besides the owners. If if detects two voices that are known terrorists, then it can now establish a relationship between the two and begin recording and transmitting their conversations to be used as evidence. It can also be used for drone strikes to confirm if there is just one terrorist in an area (low priority strike) or a group of terrorists (high priority). It can even be used to determine if there are children, women, or civilians in the area. (Abort) So the military applications of such technology is significant. I don't see this as much of a threat to common citizens however, at least not more of a threat than any existing malware.