Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpgThese days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

This exploit can use Siri and Google Now to perform any number of actions using your mobile device. The hacker can silently issue commands to devices that have headphones plugged in, acting as a receiving antenna. For example, the headsets that business owners love to use to communicate while out and about could work for this exploit. The headphones antenna acts like an FM radio chip that can communicate with mobile devices.

ZDNet explains further how this particular exploit works:

With the open source GNU Radio software on a laptop, electromagnetic signals can be sent to those devices. Depending on the sent command, Siri or Google Now can be told to open up a website, send a text, place a call or do any other number of things.

In order to pull this hack off, the attacker only needs to use a laptop with some sort of antenna apparatus to broadcast the signal. All of this could easily be concealed in a backpack and taken on the move. Granted, this exploit is also dependant on whether or not users will leave headphones plugged into the device when not in use, which is relatively unlikely.

Researchers further explained that this hack can work from around six feet from the phone, meaning that the hacker still has to get somewhat near the victim. Furthermore, the signal could potentially extend up to 16 feet from the victim, if the hacker has a powerful enough battery and antenna. Of course, this kind of powerful equipment isn’t nearly as portable as a laptop, making it somewhat inefficient to use, despite the further range.

Finally, it’s very likely that users will notice that their devices are being tampered with before the hacker manages to do anything fishy. The hack doesn’t disable the display of the device, so anyone who is currently using their device will notice what’s happening and react to it, hopefully. These types of hacks are one reason that you should always practice proper smartphone security and use a lock screen. It’s not known if this trick can bypass the lock screen, but either way, it’s a best practice to always be using one. You never know who could get into your device if you’re not using it, especially if you lose it or it gets stolen in a public place. This is why you need some sort of login credential for your device, just like you would for your laptop or desktop PC.

What are your thoughts on this new exploit? Do you think there’s a chance that this kind of vulnerability could be a threat to the business world, or do you think there’s little chance of it having any practical use? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Server Save Money Cloud Computing Passwords Windows 10 Saving Money Holiday Gadgets Tech Term Chrome Social Media Virtualization Managed Service Microsoft Office Automation Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime Mobile Device Management Networking IT Support Wi-Fi Hacking Health BYOD Internet of Things Spam Alert Covid-19 Information Office 365 Managed Service Provider Telephone Systems Information Technology Remote Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Remote Monitoring Password Money App Big Data History Encryption Applications Data Breach Mobile Computing Human Resources Law Enforcement Application Blockchain Mobile Office Paperless Office How To Managed IT Apps Office Tips Data Storage Training Patch Management VPN Government Remote Computing Private Cloud Data Security HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Wireless Vulnerability Gmail Windows 7 Word Google Drive Flexibility Settings Marketing WiFi Servers IT solutions Two-factor Authentication Avoiding Downtime Entertainment Website Budget Mouse Vendor Managed Services User Error Save Time Software as a Service Display Telephone System Staff Meetings Machine Learning Connectivity Remote Work Cleaning Employee/Employer Relationship Risk Management Hacker RMM End of Support Conferencing The Internet of Things Education Physical Security Lithium-ion battery Scam Safety Sports HIPAA Data Protection Redundancy Firewall Keyboard Vendor Management Virtual Reality Apple USB Social Solid State Drive Wireless Technology Virtual Assistant Current Events Authentication How to Database Downtime IT Consultant Telephony Samsung Remote Workers Humor Data storage Wearable Technology Automobile Value Processor Retail Update Hard Drives Spam Blocking Electronic Medical Records Instant Messaging Excel Hard Drive Robot Computing Infrastructure Google Docs Going Green Hiring/Firing Identity Theft Biometrics Virtual Desktop Computing Battery Shadow IT DDoS Legal Augmented Reality SharePoint Fraud Internet Exlporer Business Intelligence Virus Digital Signage Remote Worker Audit Unified Threat Management Worker IT Management Cryptocurrency Computer Accessories Customer Service PDF Environment Botnet Proactive IT IT Plan Procurement Fax Server Comparison Net Neutrality Workplace Strategy Best Practice Help Desk YouTube Unsupported Software SaaS Printer CES Printing Black Market Bluetooth Charger Business Technology Content Management Access Control Network Congestion Compliance OneNote eWaste Document Management Computer Care Managed Services Provider Tablets Monitoring Batteries Netflix Digitize Two Factor Authentication Workforce Entrepreneur Virtual Private Network Windows 8.1 Root Cause Analysis Cables Windows Server 2008 R2 Files Shortcut Music Chromecast HBO Customer relationships Knowledge Nanotechnology IT Assessment Telecommuting Manufacturing Cost Management Skype Project Management Email Best Practices Uninterrupted Power Supply Data loss Cortana Social Networking Colocation Troubleshooting Security Cameras Outlook Computer Tips Leadership Digital Signature Managed IT Service OneDrive Biometric Security Monitor Start Menu Warranty Virtual CIO Consultant Screen Mirroring HVAC Peripheral Running Cable Loyalty Google Apps Books Memory Frequently Asked Questions Digital Security Cameras Analytics Analysis Using Data Windows 10s Devices Copiers 5G Reputation Streaming Media Mobile Administrator Tech Support Best Available Cast Enterprise Content Management Quick Tip Content Techology Emergency Smartwatch Laptop WIndows 7 Tip of the week MSP Ergonomics webinar Accountants Professional Services Microchip Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Customers Science Password Management PCI DSS Audiobook Assessment Password Manager Virtual Machine Fiber Optics Multi-Factor Security Employee Touchpad Windows Server 2008 2FA Tools Search Engine Twitter Messaging Cabling NIST Policy Distributed Denial of Service Politics Television Business Mangement Hypervisor Customer Relationship Management Advertising Smart Tech Trend Micro Windows Media Player Trending Analyitcs User Dark mode PowerPoint Addiction SMS Amazon Default App Programming Notifications Procedure Public Computer Recycling Saving Time Practices Shopping Transportation Google Search Managing Stress Regulations Wiring dark theme Computer Fan Cache AI Antivirus Rootkit Amazon Web Services IT Infrastructure Relocation Bing Windows 8 Safe Mode FinTech Cameras Criminal Workers Hosted Computing Social Network IT service Video Games Benefits GDPR FENG Wireless Internet Worker Commute Online Shopping Investment Tablet File Sharing Employees Experience IBM Employee/Employer Relationships Inventory Domains Scalability Smart Technology Specifications ISP Flash Camera Windows 365 Wire Video Conferencing Business Owner Evernote ROI Travel Shortcuts NarrowBand Software Tips Sales IaaS Printer Server Supercomputer Bitcoin Maintenance Emails Personal Search Millennials Cryptomining Bloatware Sync Printers Point of Sale Smart Office Supply Chain Management Wireless Charging iPhone

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code