Service receive & sending SMS

Monitor wiretapping by hackers, myth or reality?

1444   |     /   Security

Monitor wiretapping by hackers, myth or reality?
Sounds made by the monitor will help hackers determine the image that is currently displayed on the screen.

By now, you are probably well aware that hackers can crack webcams like the one installed on your computer. With the right malware and a bit of luck, they can, at their discretion, take control and take pictures, record video and audio. This is a frightening scenario that has faced dozens of victims in recent years.

Registering qiwi on a virtual number will ensure the security of your mobile phone and save it from cyber criminals.

It’s quite simple to protect yourself from peeping, from those who want to look into your webcam. Just stick a piece of electrical tape when not in use. However, the microphone is not so easy to shield ... and this can be a very serious problem.

You might think that the camera is a more serious problem, but it turns out that a properly placed microphone is the key to an incredibly smart new hacking technique that sounds like science fiction. Researchers have figured out how to remotely spy on a computer screen while listening from a microphone.

No, that makes no sense. Screens are designed to look at things ... so how can someone listen to the electronic images that they show?

This is due to a phenomenon called whistle coils. The sounds of coils are usually the high pitched sounds that electronic components make when they have to do a lot of hard work. Old tube-type televisions and monitors were notorious for their whistles, but modern high-tech LCDs also produce it.

A team of security researchers has found that they can listen to the whistle of the coil using a well-positioned microphone. The raw data that the researchers recorded is not at all like what you need to work on (picture above).

These lines, as reported by Ars Technica, simply represent the intensity of a specific pixel on the display. However, this is only the first stage of the attack. A specially trained machine mind algorithm was able to translate these records. Using this specialized software, the team successfully identified the websites that were currently displayed on the monitor with an accuracy of 96.5%.

It is unlikely that hackers will use such a technique in the near future. There are much simpler ways to track someone's computer activity. Nevertheless, there is potential ... and as we continue to fill our homes with intelligent speakers, connected baby monitors and security cameras equipped with microphones, this type of attack will become increasingly attractive to cybercriminals.

Similar news

Secure accounts with Google Chrome and password manager

For some time, Google and other technology companies have been involved in password destruction. It’s easy enough to understand why. We have dozens or even hundreds, and we do not always make the best choice when creating them. Reuse and weak passwords make it easy to crack our accounts.

Hacking any laptop by freezing a chip

Over ten years ago, security researchers demonstrated a hacking technique called “cold boot.” Surprisingly, this method is still effective against laptops that are sold today and maybe even yours.

This simple attack will crash your iPhone or Mac.

The Internet can be an insidious place. If you are an iPhone, iPad or Mac user, there is a whole new attack that you need to pay attention to. Surprisingly, it only contains 15 lines of code.


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved