The act of hacking something simply implies the object, either a computer or other device, is accessed without the owner’s permission or a program or software therein is altered in some way without consent. Although more and more technological advancements are being made every day to keep our devices and computers save, it seems that hackers are always one step ahead of software developers, consistently figuring out a way around any safety features that might have been implemented. Unfortunately, this seems to be an issue that has no reliable or effective solution.
How Bad is The Problem of Hacking?
If you have ever wondered how bad the problem with hacking really is, take a look at these statistics/facts to get an idea of the scope of the problem at hand:
Did You Know Hackers Might Not Stop With Security Breaches Affecting Your Personal and Financial Information?
More than likely, you already knew about some of the above hacking incidents. However, you probably didn’t know that even devices like Fitbits have been found susceptible to hacking. That’s right. According to recent research done in collaboration by teams from the University of South Carolina and the University of Michigan, these devices can be hacked. However, the fact that they can be hacked isn’t the most surprising element of the research findings. The fact that the researchers successfully hacked these devices utilizing sound was even more surprising.
More About The Sound Hacking Research Findings:
Researchers were able to manipulate accelerometers in devices like Fitbits through acoustic attacks. They simply added extra step counts and the like. However, getting credit for a step you didn’t take is far from the most worrisome issue with this research. The fact that researchers were able to use sound to do so presents a new potential problem that will need to be dealt with in the future.
The Dangers of Acoustic Hacking:
Hacking via acoustics is obviously not the most commonly employed way of data manipulation. Kevin Fu, who is the associate professor of electrical engineering and computer science at the University of Michigan, explained how it works:
“It’s like the opera singer who hits the note to break a wine glass, only in our case, we can spell out words.”
These words are entered as commands that manipulate the device, altering data. As was stated earlier, although changing a Fitbit to show more steps than were actually taken is trivial, the ability of researchers to do so shows a potential weakness in all such devices. This weakness is one that has not previously been considered that being the danger or acoustic or sound hacking. Thankfully, now that this research has taken place, software and device developers will be aware of the potential issue and will most assuredly create protections against it if it becomes a security issue.
Call Alary Clinitech in Oshawa, Toronto and Southern Ontario today at (416) 291-7377 or contact us via email at email@example.com to learn more about potential new security threats like sound hacking.
Thanks for helping us upgrade our Macs and get them working exactly as our business needs! Fast, convenient and very knowledgeable! You’re the best!
Alary Technologies has been our IT support team for the past year at the START Clinic for Mood and Anxiety Disorders.Â They have done a excellent job in upgrading our system, organization, and supporting us in technical computer matters.Â Compared to other IT companies we have worked with, Alary Technologies comes on top.Â Ahmed Kufaishi the Managing Director at Alary Technologies is solution focused, knowledgeable and makes an effort to really understand his clientsâ€™ needs.Â It has been a pleasure to work with Ahmed and Alary Technologies.Â I would recommend their services to other companies and clinics.
â€œWe continue to work with Alary Technologies due to the fact that they are quite educated and knowledge based with current upgrades, and their commitment to their customers.â€
Ahmed has been providing our company with expert IT services for close to 3 years. He has guided us through hardware upgrades, server back up procedures and was instrumental in brokering a custom software program that fully automated some key functions in our business. Ahmed has always been thoroughly professional in all his dealings with us and has provided consistent and sound advise for all of our IT requirements. We consider Ahmed and Alary Technologies to be an important partner for our business.
It is refreshing to work with someone who can organize things and describe in plain language. I have a large and growing knowledge base for my work as an architect. I have realized that I canâ€™t do everything, that I do need a team member who can look after this one relatively small by crucial part of my practice.