If your smartphone is behaving erratically, you may be a victim of touchscreen hacking

Argentina Noticias Noticias

If your smartphone is behaving erratically, you may be a victim of touchscreen hacking
Argentina Últimas Noticias,Argentina Titulares
  • 📰 PhoneArena
  • ⏱ Reading Time:
  • 31 sec. here
  • 2 min. at publisher
  • 📊 Quality Score:
  • News: 16%
  • Publisher: 59%

Hackers can get into your phone by simply planting a device in public places.

, but researchers from China's Zhejiang University and Germany's Technical University of Darmstadt have now discovered a hardware-based method that hackers can use to take over smartphones.

All an attacker would need to do to execute this method is be in close proximity to the victim. They could put their equipment in public places to send electromagnetic signals to phones. Unfortunately, the most common places for touchscreen hacking are public places like libraries, cafes, or conference lobbies, where people place their smartphones face-down on the table. The attackers prepare the equipment under the table in advance and launch the attack remotely. The user may not even notice that their gadget has been hacked." - Adrianus Warmenhoven, NordVPN cybersecurity expert.

Hemos resumido esta noticia para que puedas leerla rápidamente. Si estás interesado en la noticia, puedes leer el texto completo aquí. Leer más:

PhoneArena /  🏆 322. in US

Argentina Últimas Noticias, Argentina Titulares

Similar News:También puedes leer noticias similares a ésta que hemos recopilado de otras fuentes de noticias.

Hackers target AI users through fake ChatGPT appHackers target AI users through fake ChatGPT appChatGPT is an online-based tool, but scammers are developing fake apps, hoping you will download malware to your phone.
Leer más »

Study: North Korean Crypto Hackers Have Stolen $2.3 Billion | CoinMarketCapStudy: North Korean Crypto Hackers Have Stolen $2.3 Billion | CoinMarketCapCryptoNews: According to a report, Japan has been the country most affected by North Korean cyberattacks on cryptocurrency platforms and users.
Leer más »

Hackers are using a devious new trick to infect your devices | Digital TrendsHackers are using a devious new trick to infect your devices | Digital TrendsTwo new website domain name extensions have just been launched, and hackers are already abusing them to trick people into downloading malicious files.
Leer más »

Microsoft just gave you a new way to stay safe from viruses | Digital TrendsMicrosoft just gave you a new way to stay safe from viruses | Digital TrendsPassword-protected viruses have long been a tactic for hackers to evade detection, but Microsoft has just unleashed a new way of putting them to the sword.
Leer más »

Pentagon hacking fears fueled by Microsoft's monopoly on military ITPentagon hacking fears fueled by Microsoft's monopoly on military ITEveryone uses Microsoft, including the U.S. government and military. The reliance on one vendor makes us more vulnerable to hackers and cyberspies, experts say.
Leer más »

Kaspersky Uncovers Counterfeit Trezor Wallets That Jeopardize Crypto Assets With Pre-Knowledge of Private Key – Bitcoin NewsKaspersky Uncovers Counterfeit Trezor Wallets That Jeopardize Crypto Assets With Pre-Knowledge of Private Key – Bitcoin NewsThe researchers at Kaspersky were able to extract the custom firmware that the hackers had installed on the counterfeit crypto hardware device.
Leer más »



Render Time: 2025-04-08 08:29:26