Computer hacking is a crime most importantly
how to survive it?
Here’s a security update to haunt your dreams, and to make the
FBI’s quest for un-exploitable cryptographic backdoors look all the more
absurd: a team of Israeli researchers has now shown that the sounds made by a
computer’s fan can be analyzed to extract everything from usernames and
passwords to full encryption keys. It’s not really a huge programming feat, as
we’ll discuss below, but from a conceptual standpoint is shows how wily modern
cyber attackers can be — and why the weakest link in anysecurity
system still involves the human element.
In hacking, there’s a term
called “phreaking” that used to refer to phone hacking via automated touch-tone
systems, but which today colloquially refers any kind of system investigation
or manipulation that uses sound as its main mechanism of action. Phone hreakers used to make free long distance phone calls by playing the correct
series of tones into a phone receiver — but hreaks can listen to sounds just as easily as they can
produce them, often with even greater effect.
That’s because sound has
the potential to get around one of the most powerful and widely used methods in
high-level computer security: air-gapping, or the separation of a system from
any externally connected network an attack might be able to use for entry. (The
term pre-dates wireless internet, and a Wi-Fi-connected computer is not
air-gapped, despite the literal gap of air around it.)
How to Protect Your Computer
The same advice parents might deliver to young drivers on their
first solo journey applies to everyone who wants to navigate safely online. A
special agent in our Cyber Division offered the following:
- Don’t drive in bad neighborhoods.
- If you don’t lock your car, it’s vulnerable; if you don’t secure your computer, it’s vulnerable.
- Reduce your vulnerability, and you reduce the threat.
Here are five simple, but critical steps to protect your computer:
- Install Firewall.
- Install Antivirus Software.
- Install Anti-Spyware Software.
- Use Complex and Secure Passwords.
- Check on the Security Settings of the Browser.

Leave your comment
Post a Comment