• Home
  • Contact Us !
  • Privacy Policy
Snipblog
  • Home
  • News
  • Mobile
  • Internet News
  • Social Media
  • Real Estate
  • Gadgets
  • Education
  • Technology
  • Finance
  • Car 2K17-2K18
No Result
View All Result
  • Home
  • News
  • Mobile
  • Internet News
  • Social Media
  • Real Estate
  • Gadgets
  • Education
  • Technology
  • Finance
  • Car 2K17-2K18
No Result
View All Result
Snipblog
No Result
View All Result
Home Gadgets

Your gadgets are vulnerable to hacking

Loknath Das by Loknath Das
March 18, 2017
in Gadgets
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

A hacking that would allow someone to add extra steps to the counter on your Fitbit monitor might seem harmless. But researchers say it points to the broader risks that come with technology’s embedding into the nooks of our lives.

Last week, a group of computer security researchers at the University of Michigan and the University of South Carolina demonstrated that they have found a vulnerability that allows them to take control of or surreptitiously influence devices through the tiny accelerometers that are standard components in consumer products like smartphones, fitness monitors and even automobiles.

In their paper, the researchers describe how they added fake steps to a Fitbit fitness monitor and played a “malicious” music file from the speaker of a smartphone to control the phone’s accelerometer. That allowed them to interfere with software that relies on the smartphone, like an app used to pilot a radio-controlled toy car.

“It’s like the opera singer who hits the note to break a wineglass, only in our case, we can spell out words” and enter commands rather than just shut down the phone, said Kevin Fu, an author of the paper, who is also an associate professor of electrical engineering and computer science at the University of Michigan and chief executive of Virta Labs, a company that focuses on cybersecurity in health care. “You can think of it as a musical virus.”

The flaw, which the researchers found in more than half of the 20 commercial brands from five chipmakers they tested, illustrates the security challenges that have emerged as robots and other kinds of digital appliances have begun to move around in the world.

With dozens of startups and large transportation companies pushing to develop self-driving cars and trucks, undetected vulnerabilities that might allow an attacker to remotely control vehicles are an unnerving possibility.

Still, computer security researchers said the discovery was not a sky-is-falling bug but rather a revealing window into the cybersecurity challenges inherent in complex systems in which analog and digital components can interact in unexpected ways.

“The whole world of security is about unintended interactions,” said Paul Kocher, a cryptographer and a former executive at the chip company Rambus.

Accelerometers are instruments that measure acceleration and are frequently manufactured as silicon chip-based devices known as microelectromechanical systems, or MEMS. Accelerometers are used for navigating, for determining the orientation of a tablet computer and for measuring distance travelled in fitness monitors such as Fitbits.

In the case of the toy car, the researchers did not actually compromise the car’s microprocessor, but they controlled the car by forcing the accelerometer to produce false readings. They exploited the fact that a smartphone application relies on the accelerometer to control the car.

While toy cars might seem like trivial examples, there are other, darker possibilities. If an accelerometer was designed to control the automation of insulin dosage in a diabetic patient, for example, that might make it possible to tamper with the system that controlled the correct dosage.

Fu has researched the cybersecurity risks of medical devices, including a demonstration of the potential to wirelessly introduce fatal heart rhythms into a pacemaker.

He said the current research was inspired by a discussion in his group about a previous study in which drones were disabled with music. He added that earlier research demonstrated denial-of-service attacks that used sound to disable accelerometers.

In 2014, security researchers at Stanford University demonstrated how an accelerometer could be used surreptitiously as a rudimentary microphone, for example. And in 2011, a group from the Massachusetts Institute of Technology and the Georgia Institute of Technology demonstrated the use of an accelerometer in a smartphone to decode roughly 80 per cent of the words being typed on a nearby computer keyboard by capturing vibrations from the keyboard.

In the case of the research by the University of Michigan and the University of South Carolina, scientists stopped the accelerometer from functioning and changed its behaviour.

In testing 20 accelerometer models from five manufacturers, they affected the information or output from 75 per cent of the devices tested and controlled the output in 65 per cent of the devices.

The Department of Homeland Security was expected to issue a security advisory alert last Tuesday for chips produced by the semiconductor companies documented in the paper, Fu said. The five chipmakers were Analog Devices, Bosch, InvenSense, Murata Manufacturing and STMicroelectronics.

The paper, which will be presented at the IEEE European Symposium on Security and Privacy in Paris next month, also documents hardware and software changes manufacturers could make to protect against the flaws the researchers discovered.

— New York Times News Service

John Markoff is a journalist with the New York Times. He has written a book and series of articles about the 1990s pursuit and capture of hacker Kevin Mitnick.

[“Source-gulfnews”]

Tags: AregadgetsHackingTovulnerableyour
Previous Post

Global finance gathering struggles to define trade stance

Next Post

A brief on Dirt Bike Graphics

Loknath Das

Loknath Das

Next Post
A brief on Dirt Bike Graphics

A brief on Dirt Bike Graphics

  • Trending
  • Comments
  • Latest
The 3 Main Types of Scaffolding and What They are used for

The 3 Main Types of Scaffolding and What They are used for

December 18, 2016
Microsoft’s OneNote Can Now Help With Your Maths Homework

Microsoft’s OneNote Can Now Help With Your Maths Homework

September 3, 2016
A Brief History of Mayo Stands and Other Tools and Equipment

A Brief History of Mayo Stands and Other Tools and Equipment

October 25, 2016
Modest Fashion 2023: A Comprehensive Guide

Modest Fashion 2023: A Comprehensive Guide

May 26, 2023
Asus ZenFone 2 Variant With 4GB RAM, 16GB Inbuilt Storage Launched

Asus ZenFone 2 Variant With 4GB RAM, 16GB Inbuilt Storage Launched

0
Optical Fibre Laid in 68,000 Village Panchayats: Telecom Minister

Optical Fibre Laid in 68,000 Village Panchayats: Telecom Minister

0
iPhone 6s Sports 1.8GHz Dual-Core Apple A9 SoC in Certification Listing

iPhone 6s Sports 1.8GHz Dual-Core Apple A9 SoC in Certification Listing

0
Microsoft Targeting SMBs in Punjab, Haryana for Cloud Services

Microsoft Targeting SMBs in Punjab, Haryana for Cloud Services

0
Navigating Technological Challenges: How Redapt Can Drive Your Success

Navigating Technological Challenges: How Redapt Can Drive Your Success

May 10, 2025
7 benefits of mobile apps for businesses

7 benefits of mobile apps for businesses

May 5, 2025

Announcing the general availability of Llama 4 MaaS on Vertex AI

May 2, 2025
Benefits of a Home Loan: Save Money on Taxes While Realizing Your Dream of Owning Your Own Home

Benefits of a Home Loan: Save Money on Taxes While Realizing Your Dream of Owning Your Own Home

April 16, 2025

Recent News

Navigating Technological Challenges: How Redapt Can Drive Your Success

Navigating Technological Challenges: How Redapt Can Drive Your Success

May 10, 2025
7 benefits of mobile apps for businesses

7 benefits of mobile apps for businesses

May 5, 2025

Announcing the general availability of Llama 4 MaaS on Vertex AI

May 2, 2025
Benefits of a Home Loan: Save Money on Taxes While Realizing Your Dream of Owning Your Own Home

Benefits of a Home Loan: Save Money on Taxes While Realizing Your Dream of Owning Your Own Home

April 16, 2025
  • Home
  • Contact Us !
  • Privacy & Policy

No Result
View All Result
  • Home
  • News
  • Mobile
  • Internet News
  • Social Media
  • Real Estate
  • Gadgets
  • Education
  • Technology
  • Finance
  • Car 2K17-2K18