Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpgThese days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

This exploit can use Siri and Google Now to perform any number of actions using your mobile device. The hacker can silently issue commands to devices that have headphones plugged in, acting as a receiving antenna. For example, the headsets that business owners love to use to communicate while out and about could work for this exploit. The headphones antenna acts like an FM radio chip that can communicate with mobile devices.

ZDNet explains further how this particular exploit works:

With the open source GNU Radio software on a laptop, electromagnetic signals can be sent to those devices. Depending on the sent command, Siri or Google Now can be told to open up a website, send a text, place a call or do any other number of things.

In order to pull this hack off, the attacker only needs to use a laptop with some sort of antenna apparatus to broadcast the signal. All of this could easily be concealed in a backpack and taken on the move. Granted, this exploit is also dependant on whether or not users will leave headphones plugged into the device when not in use, which is relatively unlikely.

Researchers further explained that this hack can work from around six feet from the phone, meaning that the hacker still has to get somewhat near the victim. Furthermore, the signal could potentially extend up to 16 feet from the victim, if the hacker has a powerful enough battery and antenna. Of course, this kind of powerful equipment isn’t nearly as portable as a laptop, making it somewhat inefficient to use, despite the further range.

Finally, it’s very likely that users will notice that their devices are being tampered with before the hacker manages to do anything fishy. The hack doesn’t disable the display of the device, so anyone who is currently using their device will notice what’s happening and react to it, hopefully. These types of hacks are one reason that you should always practice proper smartphone security and use a lock screen. It’s not known if this trick can bypass the lock screen, but either way, it’s a best practice to always be using one. You never know who could get into your device if you’re not using it, especially if you lose it or it gets stolen in a public place. This is why you need some sort of login credential for your device, just like you would for your laptop or desktop PC.

What are your thoughts on this new exploit? Do you think there’s a chance that this kind of vulnerability could be a threat to the business world, or do you think there’s little chance of it having any practical use? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Phishing Windows Managed IT Services Upgrade Outsourced IT Data Backup Ransomware Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Gadgets Virtualization Saving Money Holiday Tech Term Social Media Chrome Managed Service Automation Microsoft Office Managed IT Services Cybercrime Computers Artificial Intelligence Facebook Operating System Health Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Internet of Things Alert Spam Information Remote Office 365 Telephone Systems Managed Service Provider Information Technology Covid-19 Bandwidth Router Social Engineering Mobility BDR Employer-Employee Relationship Recovery Human Resources Mobile Computing Password Remote Monitoring Money Application Encryption Applications Data Breach App History Big Data Law Enforcement How To Managed IT Remote Computing Blockchain Paperless Office Mobile Office Apps Data Storage Patch Management Office Tips Training Government VPN Private Cloud Flexibility Two-factor Authentication Marketing WiFi Bring Your Own Device IT solutions Mouse Entertainment Data Management HaaS Website Work/Life Balance Budget Vulnerability Windows 7 Word Infrastructure Voice over Internet Protocol Google Drive Servers Wireless Avoiding Downtime Gmail Data Security Settings Save Time Virtual Reality Apple Social Cleaning Telephone System Staff Software as a Service USB User Error Conferencing Machine Learning Meetings Connectivity Remote Work End of Support Scam Education Physical Security Safety Risk Management Hacker Vendor Sports HIPAA Redundancy Vendor Management Managed Services Display The Internet of Things Keyboard Lithium-ion battery Data Protection Employee/Employer Relationship RMM Firewall Computer Accessories Solid State Drive Wireless Technology CES Computing How to Downtime Value SaaS Spam Blocking Business Technology Electronic Medical Records Content Management Data storage Access Control Automobile Printer Digital Signage Virtual Assistant Network Congestion Hiring/Firing Bluetooth eWaste Authentication Computing Infrastructure Going Green Procurement Net Neutrality Workplace Strategy Update IT Consultant Battery Business Intelligence Wearable Technology Help Desk Shadow IT Retail Hard Drives Google Docs Printing Legal Audit Worker Instant Messaging Robot Identity Theft Excel Humor IT Management Internet Exlporer Botnet Biometrics Virtual Desktop Managed Services Provider IT Plan PDF Database Augmented Reality Fraud Unsupported Software DDoS Proactive IT Remote Workers Remote Worker SharePoint Charger Best Practice Processor Cryptocurrency YouTube Compliance OneNote Black Market Computer Care Customer Service Hard Drive Current Events Virus Environment Telephony Comparison Samsung Fax Server Document Management Unified Threat Management Smartwatch File Sharing IT service Ergonomics Skype Managing Stress Specifications Development OLED Data loss Camera Inventory Wire Troubleshooting Evernote Tablet PCI DSS Virtual Machine Outlook Files Leadership Start Menu Cameras Employee Chromecast Domains 2FA Travel Fiber Optics Millennials Messaging Cabling Screen Mirroring Printers Loyalty Smart Office Uninterrupted Power Supply Maintenance Books Wireless Charging Policy Hypervisor Frequently Asked Questions Colocation IaaS Mobile Windows 10s Bloatware Dark mode Trend Micro Workforce SMS Default App Cast Virtual Private Network Monitor webinar Emergency Cables Tablets Procedure Saving Time Tip of the week Shopping Professional Services Printer Server Google Search Public Cloud Employer Employee Relationship Entrepreneur dark theme Streaming Media Telecommuting AI IT Infrastructure Project Management Reputation Assessment Nanotechnology Bing Tech Support Shortcut Cortana FinTech Content Windows Server 2008 Social Network Tools Techology Laptop Digital Signature Cost Management Social Networking Investment Warranty Customers Television HVAC Google Apps Employees Employee/Employer Relationships Audiobook ISP Touchpad Analysis Windows 365 Devices Video Conferencing ROI Administrator Running Cable Public Computer Shortcuts Advertising Enterprise Content Management Transportation Memory Sales Bitcoin Politics Regulations Personal Cryptomining Computer Fan MSP Rootkit Accountants Point of Sale Thought Leadership Notifications Credit Cards Supply Chain Management Microchip Workers Password Management Benefits Password Manager Monitoring Consultant Batteries Multi-Factor Security Digitize Analytics FENG Windows 8.1 Twitter Science Windows Server 2008 R2 Search Engine Relocation IBM NIST Smart Technology Business Mangement Customer relationships Best Available Flash WIndows 7 Trending IT Assessment Manufacturing Video Games Smart Tech Email Best Practices Addiction Customer Relationship Management Amazon Worker Commute Software Tips Distributed Denial of Service Supercomputer Security Cameras Emails Recycling Analyitcs Computer Tips Managed IT Service Experience Sync OneDrive Biometric Security Scalability Wiring Practices Programming Virtual CIO Cache Amazon Web Services Peripheral Business Owner Netflix Safe Mode NarrowBand Two Factor Authentication Criminal Digital Security Cameras Using Data User Copiers PowerPoint 5G Search Root Cause Analysis Windows Media Player GDPR Antivirus Hosted Computing Wireless Internet Music Online Shopping Windows 8 Quick Tip HBO iPhone Knowledge

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code