Beware .. 4 unexpected ways that hackers enter your own devices and destroy them



[ad_1]

Beware .. 4 unexpected ways that hackers enter your own devices and destroy them

Monday 02 September 2019 at 16h

Piracy is primarily about viruses, but hackers have developed several methods that penetrate, destroy and control devices, and even endanger the health and safety of people at a distance.

Here is an example of the unexpected methods used by hackers to hack users:

1. helmet

Research has revealed that many modern tools can be used to produce sounds that are dangerous to human ears. Security researcher Matt Weixe says there is a group of poorly protected devices to prevent their conversion into electronic weapons.

Wexi has tested laptops, mobile phones, headphones and many types of headphones. Weaknesses can cause physical damage to individuals.

2. Charging cable

Most users do not think much when connecting the charging cable of the phone. But the project of a hacker revealed that an Apple Lightning cable can be tampered with, thus allowing the hacker, when he is connected to a computer, to control the device.

TechCrunch explains that all the attacker needs to do is replace the real cable with a dangerous cable and wait for the target victim to connect it to the computer. From a device located nearby and within range Wi-Fi, attackers can send wireless malware to the computer.

3. mouse

Hackers can enter a computer without even touching it or know its network address, according to The Virg. All you have to do is press the mini USB receiver of the mouse.

Thus, a hacker can write things on the screen of the victim's computer, erase the hard drive and install malicious software or worse.

4. Video clips

If you use a phone still running between Android versions 7.0 and 9.0, you should immediately install the latest security update, otherwise you risk hijacking your device for malicious software within malicious sections.

The reason for this is a vulnerability in the above versions of Android that allows hackers to execute arbitrary code remotely, by infiltrating "specially crafted files," explains The Next Web, including videos with malicious charges. . Thus, once the victim has opened the file, attackers can access their device.

This article "Warning .. 4 unexpected ways that hackers enter your own devices and destroy them" Adapted from the site (Marib Press), and does not reflect in any way the policy of the site or point of view, but the responsibility of the actuality or authenticity rests on the source of the actuality of origin, Marib Press.

[ad_2]
Source link