Some of the most sensitive data in the world is not stored on the Internet, nor even have access to the Internet, the computers they exist on are completely isolated from other machines. This precaution is a way to prevent any form of remote hacking or a security breach. These systems are known as single machines, and are almost impossible to crack because there is no connection with anything else. But that could change as researchers in Israel have discovered that hackers could use radio signals to steal data. Combining this with mobile phones, it might be possible to attack and steal the information stored in these "isolated" machines.
Hackers use radio frequencies and mobile phones as senders / receivers to siphon data secure machines. While the machines themselves have no way to transmit data, mobile phones inside mobile phones of employees, for example, may be vulnerable to transmit unknowingly.The process data itself is enough complicated, but if in the wrong hands, could be catastrophic. The signal from a mobile phone is limited, the attack can occur close enough, but with the right technology, it could be extended. Not only is a range of problems with this method, but also speed. The data transmission rate is estimated to be only about 60 bytes per second, which gives more than 10 hours for a single document. As the attack is not as invasive or obvious when his past, the attack does not necessarily need to be fast, hackers could set up and steal data without disruption.
The real problem with this vulnerability is that it is very difficult to guard against. Companies that want to keep their data safe already isolated from the internet, but unless they not apply to mobile phones inside the building, or a physical barrier to prevent the radio signals so they can only the hope criminals will promote this technology.
0 Komentar