您的当前位置:首页 >娛樂 >【】TopicsAppleCybersecuritySamsung 正文
时间:2025-10-23 13:31:59 来源:网络整理编辑:娛樂
Yeah, so this isn't good.。 What if the very act of tapping your smartphone's passcode was all it too
Yeah, so this isn't good.。
What if the very act of tapping your smartphone's passcode was all it took to expose that code to hackers?
Are you sitting down right now? You should probably sit down. 。
SEE ALSO:Put a lock screen on your phone, sheeple! 。Remember that story on how fingerprint locks on smartphones can be duped? And that Samsung's facial recognition system can be tricked with a photo of a person?
Well, as more and more of our personal data is stored on smartphones, the ways of securing those phones continue to be revealed as less and less robust. Next on the chopping block is your trusty PIN.。
Thanks for signing up! 。 Modern smartphones come equipped with tons of sensors: cameras, microphones, GPS, accelerometers, gyroscopes, etc. According to a new study published in the。Journal of Information Security and Applications。
, this data in aggregate is precise enough to determine what actions a user is taking with her phone — right down to the password she taps to unlock it.。
A little malicious code plus the sensors that come standard on most smartphones is apparently all that it takes these days to render your phone's security moot. 。
The study authors haven't found this attack in the wild, but rather demonstrated that it works. Which, frankly, is scary enough. As Wikileaks' dump of alleged CIA hacking tools has shown, known attacks have a way of getting passed around. 。
"Our study confirms that embedded JavaScript code can compromise user sensitive information by listening to the side channel data provided by the motion and orientation sensors without any user permission, through an inactive tab, iframe, or minimised browser (even when the screen of the mobile phone is locked)," wrote study co-author Dr. Maryam Mehrnezhad on the Newcastle University blog. "We demonstrate the practicality of this attack by collecting data from real users and reporting high success rates, up to 70% identification of digits (PIN) in Android and 56% in iOS." 。
A lot of browsers are susceptible, including Chrome, Firefox, and Safari. That means you don't even have to click a weird link or download a strange file to accidentally leak your taps to a malicious hacker or government official.。
Featured Video For You。
Mall builds real2025-10-23 13:27
Gather round and be blessed by this precious puppy's 'newborn' photoshoot2025-10-23 13:20
Secret service guy is wondering what’s happened to his life2025-10-23 12:46
Billy Eichner and Meghan McCain go to war on Twitter over Meryl Streep's Golden Globes speech2025-10-23 12:37
Xiaomi accused of copying again, this time by Jawbone2025-10-23 12:23
McDonald's India will now serve masala dosa burger and other local food for breakfast2025-10-23 12:14
Now you can turn your Apple Watch into a mini retro Macintosh for $152025-10-23 12:09
Mexico's solution to Trump's tweets? Buy Twitter and shut it down2025-10-23 11:46
The U.S. will no longer have the final say on internet domain names2025-10-23 10:51
The science of the puke2025-10-23 10:50
U.S. government issues warning on McDonald's recalled wearable devices2025-10-23 13:04
New YouTube feature lets fans 'tip' creators during live streams2025-10-23 12:56
Taco Bell's newest creation may be the grossest fast food invention yet2025-10-23 12:54
Star Wars museum finally picks official home2025-10-23 12:50
Two astronauts just installed a new parking spot on the International Space Station2025-10-23 11:58
Kim Kardashian's chauffeur among those arrested in connection with Paris robbery2025-10-23 11:46
Vengeful girl used the plot of 'Finding Nemo' to prank a Tinder match2025-10-23 11:39
The most dad2025-10-23 11:25
U.S. pole vaulter skids to a halt for national anthem2025-10-23 11:19
Here's why those tech billionaires are throwing millions at ethical AI2025-10-23 11:03