Top 5 unlikely (but true) ways to get hacked
These are the top five strange, but true ways to get hacked.
Time to get paranoid.
We are ranking these hacks from least likely, to most likely to happen.
For this top five, we asked an expert, Hak5 Zone's Shannon [UNKNOWN] to help us out with this.
At number five, laser microphones.
This hack dates back to 2009, and was accomplished by inverse [UNKNOWN] Here's how it works.
They pointed a laser at a laptop, and sampled vibrations to determine keystrokes.
The team found that pointing at the hinges lead to better results.
Inverse path did note that they know it's kinda hard to get line of sight for the laser Microphone though.
And number four is the inaudible audio.
This hack was built by the Fraunhofer Institute for communication, information processing, and ergonomics as a proof of concept in 2013.
It used the built in mics and speakers Of two Lenovo laptops to transmit data at a distance of around 65 feet.
This method transferred data at a pretty slow rate of 20 bits per second, but that's plenty fast enough to grab keystrokes.
And number three, hard drive sounds.
Researchers at [UNKNOWN] University were able to transmit data from computers by reading hard drive sounds.
First, malware needed to be installed on the victim's computer.
The malware controls the actuator arm on the hard drive.
When that arm moves, it makes a sound.
The malware would create sounds through the actuator arm.
Audio frequencies could be picked up by a receiver like a phone or a laptop.
Data speeds reached 180 bits per minute
[MUSIC]
And could travel up to about six feet in distance.
This exact method would not work on SSDs, because they don't have [UNKNOWN] arms.
At number 2, the hard drive LED.
This one was also by researchers at Ben-Gurion University.
They found a way to turn that little hard drive light that flashes into a transmitter.
The victim's computer would be infected with malware first.
Then you would be able to cause a hard-drive LED to flicker.
In the demo, a camera on a drone was able to view the LED flickering, which will be sending encoded data.
At number one, accelerometer keylogging.
This hack was developed by researchers at Georgia Tech.
Here's how it works.
The victim would download a malicious app that ask for permission to use the accelerometer, so something like a level app.
Then, the app would be able to collect accelerometer data as you typed on the screen.
From that data, the researchers could configured out what the victim was typing.
In one test, the researcher is trying to settle an iPhone 4 and found it's gyroscope help clean up the data it was scraping [INAUDIBLE] Thanks again to Shannon Morse for the help.
If you're interested in hacking things, check out Hak5.org.
I'm Iyaz Akhtar and I'll see you online.
Up Next
iPhone 14 is Missing These 5 Features
Up Next
iPhone 14 is Missing These 5 Features
Top 5 new Samsung Galaxy S22 rumors
Top 5 new Samsung Galaxy S22 rumors
Top 5 iPhone 14 Rumors
Top 5 iPhone 14 Rumors
Top 5 most exciting Galaxy S22 Ultra rumors
Top 5 most exciting Galaxy S22 Ultra rumors
Windows 11: Will Microsoft learn from past mistakes?
Windows 11: Will Microsoft learn from past mistakes?
Top 5 most exciting iPhone 13 rumors
Top 5 most exciting iPhone 13 rumors
5 cheaper alternatives to the AirPods Pro
5 cheaper alternatives to the AirPods Pro
2021 iPad Pro: The best new features
2021 iPad Pro: The best new features
5 ways to get more out of Netflix
5 ways to get more out of Netflix
2021 MacBook Pro: What to expect
2021 MacBook Pro: What to expect
Tech Shows
Latest News All latest news
What is the Fediverse?
What is the Fediverse?
The Missing Piece to Apple's Eco-Friendly Mission
The Missing Piece to Apple's Eco-Friendly Mission
First Drive in the All-Electric 2024 Fiat 500e
First Drive in the All-Electric 2024 Fiat 500e
Laptop Buying Guide: What to Look For
Laptop Buying Guide: What to Look For
Boston Dynamics Retires Its HD Atlas Robot
Boston Dynamics Retires Its HD Atlas Robot
Taste-Testing 6 Apple Cider Vinegar Drinks
Taste-Testing 6 Apple Cider Vinegar Drinks
Most Popular All most popular
First Look at TSA's Self-Screening Tech (in VR!)
First Look at TSA's Self-Screening Tech (in VR!)
Samsung Galaxy S24 Ultra Review: More AI at a Higher Cost
Samsung Galaxy S24 Ultra Review: More AI at a Higher Cost
'Circle to Search' Lets Users Google From Any Screen
'Circle to Search' Lets Users Google From Any Screen
Asus Put Two 14-inch OLEDs in a Laptop, Unleashes First OLED ROG Gaming Laptop
Asus Put Two 14-inch OLEDs in a Laptop, Unleashes First OLED ROG Gaming Laptop
Samsung Galaxy Ring: First Impressions
Samsung Galaxy Ring: First Impressions
Best of Show: The Coolest Gadgets of CES 2024
Best of Show: The Coolest Gadgets of CES 2024
Latest Products All latest products
2025 Audi Q6, SQ6 E-Tron: Audi's Newest EV Is Its Most Compelling
2025 Audi Q6, SQ6 E-Tron: Audi's Newest EV Is Its Most Compelling
Hands-On with Ford's Free Tesla Charging Adapter
Hands-On with Ford's Free Tesla Charging Adapter
Nuro R3 is an Adorable Self-Driving Snack Bar
Nuro R3 is an Adorable Self-Driving Snack Bar
First Look: The $349 Nothing Phone 2A Aims to Brighten Your Day
First Look: The $349 Nothing Phone 2A Aims to Brighten Your Day
Best of MWC 2024: Bendable Screens, AI Wearables and More
Best of MWC 2024: Bendable Screens, AI Wearables and More
This Concept Laptop from Lenovo Has a Transparent Display
This Concept Laptop from Lenovo Has a Transparent Display
Latest How To All how to videos
Tips and Tricks for the AirPods Pro 2
Tips and Tricks for the AirPods Pro 2
How to Watch the Solar Eclipse Safely From Your Phone
How to Watch the Solar Eclipse Safely From Your Phone
Windows 11 Tips and Hidden Features
Windows 11 Tips and Hidden Features
Vision Pro App Walkthrough -- VisionOS 1.0.3
Vision Pro App Walkthrough -- VisionOS 1.0.3
Tips and Tricks for the Galaxy S24 Ultra
Tips and Tricks for the Galaxy S24 Ultra
TikTok Is Now on the Apple Vision Pro