Hackers can get into your phone by simply planting a device in public places.
, but researchers from China's Zhejiang University and Germany's Technical University of Darmstadt have now discovered a hardware-based method that hackers can use to take over smartphones.
All an attacker would need to do to execute this method is be in close proximity to the victim. They could put their equipment in public places to send electromagnetic signals to phones. Unfortunately, the most common places for touchscreen hacking are public places like libraries, cafes, or conference lobbies, where people place their smartphones face-down on the table. The attackers prepare the equipment under the table in advance and launch the attack remotely. The user may not even notice that their gadget has been hacked." - Adrianus Warmenhoven, NordVPN cybersecurity expert.
United States Latest News, United States Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Hackers target AI users through fake ChatGPT appChatGPT is an online-based tool, but scammers are developing fake apps, hoping you will download malware to your phone.
Read more »
Study: North Korean Crypto Hackers Have Stolen $2.3 Billion | CoinMarketCapCryptoNews: According to a report, Japan has been the country most affected by North Korean cyberattacks on cryptocurrency platforms and users.
Read more »
Hackers are using a devious new trick to infect your devices | Digital TrendsTwo new website domain name extensions have just been launched, and hackers are already abusing them to trick people into downloading malicious files.
Read more »
Microsoft just gave you a new way to stay safe from viruses | Digital TrendsPassword-protected viruses have long been a tactic for hackers to evade detection, but Microsoft has just unleashed a new way of putting them to the sword.
Read more »
Pentagon hacking fears fueled by Microsoft's monopoly on military ITEveryone uses Microsoft, including the U.S. government and military. The reliance on one vendor makes us more vulnerable to hackers and cyberspies, experts say.
Read more »
Kaspersky Uncovers Counterfeit Trezor Wallets That Jeopardize Crypto Assets With Pre-Knowledge of Private Key – Bitcoin NewsThe researchers at Kaspersky were able to extract the custom firmware that the hackers had installed on the counterfeit crypto hardware device.
Read more »