Articles

6 ways to hack a phone or computer without being connected to the internet

by Earl S. White Blogger

We all think that to be victims of information theft and espionage, it is necessary to be connected to the Internet either with our Smartphone, laptop or desktop computer; But being disconnected from the internet does not mean that we are safe from cyber attacks.


Many companies make the decision to protect the most important and confidential information by applying the air-gapping technique, they are systems that do not have an internet connection, believing that these without an internet connection will be safe. If you need more information about how to hack mobile phones with computer please visit this site.


Although it is true that it is more difficult to hack a device without an internet connection, this does not make it impossible, nor does it guarantee that they are free from attacks, there are 6 ways to spy on and steal information from offline devices.


Hack Team has collected information about these 6 techniques to hack computers or phones without being connected to the internet.


Electromagnetic radiation emitted.


Any device needs power to function and it emits electromagnetic radiation, which can be intercepted to spy on computers.


This is not new in the world of hacking since these electromagnetic waves emitted by computers have been studied for almost 50 years to access their data.


Previously more attention was paid to the radiation emitted by CRT monitors and VGA cables, now the waves transmitted by keyboards are where we should pay attention.


 To achieve this technique, a hacker should buy a spectrum analyzer that is not cheap, this to analyze the keystrokes of a computer using the radiation emitted, at a distance of 20 meters.


Keyboard generated voltage.


Keystrokes also cause voltage or voltage fluctuations that cause noise in the device's outlet.


A hacker with equipment that includes a voltmeter without problems could intercept the noise at about 15 meters, thus knowing the keystrokes of the victim computer.




Vibrations recorded with a laser.


It is one of the cheapest methods, assuming that the hacker has a sound card installed in his computer to analyze vibrations.


The hacker should point the laser at some part of the reflective computer, it could be the manufacturer's logo, so that the return light is good, each hit on the keyboard will produce a different vibration in the reflected one, so the hacker could log keystrokes.


The accelerometer of a Smartphone.


A study by the University of Georgia showed that a smartphone's accelerometer could function as a keylogger, if placed near a computer, it would record keystrokes with 80% precision with a dictionary of 58,000 words.


FM receiver.


Kebab Hack technique developed by researchers from the University of Tel.Aviv that consists of intercepting the radio signals emitted by the CPU through the radio of a Smartphone.


This technique not only helps you to know the keystrokes, but also to know what applications are running on the victim computer.


Ultra sounds that pierce through steel.


Companies that protect their highly confidential information in an isolated place on the Internet and inside protected cameras, preventing them from carrying out the first attack, which is by means of electromagnetic waves.


In general, they are steel chambers where the information is protected, which magnetic waves cannot penetrate but the ultra sounds if, so a device is placed inside the protected camera, this could collect radiation from the attacked equipment. and transmit it to another located outside by means of these high frequency waves.


Neither of the hacker's two computers needs to be powered, since it is transmitted together with the data and can transmit up to 12 MB / s through steel.


These techniques may seem obsolete, old and even film, but they do not stop surprising that devices not connected to the Internet can be hacked, it makes us think that the information is no longer safe anywhere; On the other hand, today there are various ways to protect, store and always have our information available.

 


Data Guru is a comprehensive service for SMEs and large companies that by constantly monitoring the flow of information shared by the employees of your company. In this way, information leakage events can be detected deliberately or accidentally in a timely manner. Employee activities and business operations are not affected.


 Information theft can occur at all levels of organizations. Companies must know who has access to their information and how it will be used. The most frequent targets of this type of act are financial statements, trade secrets, projects and business innovation, databases, (CRM), payroll or relevant data from employees, customers or suppliers. Find out more about this data protection service at: Solidarityhacker.com/services/



Sponsor Ads


About Earl S. White Innovator   Blogger

12 connections, 0 recommendations, 92 honor points.
Joined APSense since, April 1st, 2020, From Teterboro, United States.

Created on May 27th 2020 09:43. Viewed 479 times.

Comments

No comment, be the first to comment.
Please sign in before you comment.