Skip to main content

Hacking Using a LIGHT BULB

What is the first thing that comes to your mind when you hear your device being hacked? We always think of possibilities like weak passwords,  phishing or any malware attacks that may have led to  breach of our personal data. 

But what about an every household essential like a ‘light bulb’ that could be a device for eavesdropping your personal conversations.

Security researchers at Bengurion University of Negev and Weizmann institute of Science in Israel are finding out ways to improve private conversation using a light bulb. Last year the researchers found out that Alexa, Siri, Google Home could be pointing lasers at the device microphones and using this is a method to breach data. 

But, using a light bulb is a more dumb method to tap a user. In this exploit also there are some pre-requisites. The hackers need a clear sight between the electro optical sensor-equipped telescope and the light bulb .So if the curtains of the room with the bulb are drawn or windows are closed then this intrusion cannot happen. 

Another disadvantage of this method is if the light bulb doesn't meet certain requirements like the thickness of the glass or the output of the light then also this method fails. The quality of the intrusion will obviously depend on how close the people are you the light bulb in the room. The researchers were able to monitor the speech and sound from a distance of 80 feet (25 metres) 

The reason why the researchers are devising such a method is because they don't want to compromise a device to launch malware attacks or any other intrusion techniques. 

Keeping all the shortcomings aside, what is your take on this type of hacking? Can it replace the traditional one?

 


Comments

Popular posts from this blog

ROBOTIC PROCESS AUTOMATION

                             ROBOTIC PROCESS AUTOMATION: Robotic process automation (RPA), also known as software robotics, uses automation technology to simulate back-office functions performed by human employees, such as extracting data, filling out forms, moving files, etc. To integrate and carry out repetitive operations between enterprise and productivity applications, it mixes APIs and user interface (UI) interactions.   WORKING: RPA is not a physical robot but software running on physical and virtual machines. RPA is used when we have to handle repetitive tasks like sometimes, we fill in the same information at different places. It is operated by running a set of workflow tasks. It gives some instructions about what to do and how to do it at different stages of the workflow. Once the task is requested, the software runs and completes the whole task accordingly as many times as we want. If there is any incorrect data in bots, the software will send a request for correct

Unhackable Internet

  W hy it matters?   The internet is increasingly vulnerable to hacking; a quantum one would be unhackable. Quantum Computing    A quantum internet could be used to send unhackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a the quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss.   Now, Harvard and MIT researchers have found a way to correct for signal loss with a prototype quantum node that can catch, store and entangle bits of quantum information. The research is the missing link towards a practical quantum internet and a major step forward in the development of long-distance quantum networks.   The U.S Department of Energy (DoE) explains how a quantum link will make it happen through two quantum phenomenon: the first is quantum entanglement, where two-particle can become so inextricably li

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the