A 'Sound Attack' lets steal information through the subtle sounds emanating from a laptop running, according to a study. To enter the alien computer does not have to be a hacker, just enough to install an application.
Behind the gentle hum of a laptop could hide the leak of sensitive documents as the three most respected cryptologists of Israel, who published a report on how to extract data from a laptop running just to capture the sounds occurs. The scientific experiment described computer specialists served to show that no matter what you do or the level of encryption you have, hackers will always find a way to steal any data. Before it was possible through WiFi or Bluetooth and now thanks to the sound information housed on a laptop will never truly secure. "Many laptops emit a high pitched sound during operation due to vibration in some of its electronics" wrote Adi Shamir, Eran Tromer and Daniel Genkin. "These acoustic emanations are more than an annoyance: can transmit information about the software running on the computer, in particular leak sensitive information about security-related calculations." The three researchers tested the theory using a laptop with a 4096-bit RSA encryption: a very difficult to hack code. After entering the key to decipher the code, the computer began to run a series of protocols to unlock the encrypted data and the central processing unit and produce a noise. Then the researchers placed a mobile phone about 30 inches from the lens and directed the internal microphone of the phone to the computer fan outlet. In interpreting the resonances, the researchers showed that a hacker could theoretically redesign the encryption key and then enter your computer. According to computer specialists, the new method could lead to a new series of computer attacks, but the scariest would be an application for a 'Sound Attack'. The attack indicated could be packaged into a software application and used by people without much knowledge. For example, in a meeting, a criminal could place of safe mode, your mobile phone with the application installed on the table next to the laptop of the victim and get the key to the end of the meeting. Other mobile devices with built-in microphones, such as tablets and laptops can also be used added Israeli specialists.
Texto completo en: http://actualidad.rt.com/actualidad/view/115076-smartphone-iphone-hackear-ordenador-portatil
Texto completo en: http://actualidad.rt.com/actualidad/view/115076-smartphone-iphone-hackear-ordenador-portatil