The 'hackers' can seize your cell phone through the headphones 'hackers' can seize your cell phone through the headphones.As reported by specialists in...18.eleven.2019, Sputnik Mundo2019-eleven-18T12:47+00002019-eleven-18T12:47+00002021-10-31T21:21+0000/html/head/meta[@name='og:title']/@content/html/head/meta[@name='og:description']/@contenthttps://cdnnmundo1.IMG.Sputniknews.com/IMG/108604/eleven/108604eleven13_0:286:4906:3061_1920x0_80_0_0_e8c7cd2e49efd7bbfa8a8a50d48e02d9.jpgSputnik Mundo contacto@Sputniknews.com+74956456601MIA „Rosiya Segodnya“252602019Sputnik Mundo contacto@Sputniknews.com+74956456601MIA „Rosiya Segodnya“25260Noticiases_ESSputnik Mundo contacto@Sputniknews.COM+74956456601MIA „ROSIYA SEGODNYA“ 2526019201080TRUE19201440TRUEHTTPS: // CDNNMUNDO1.IMG.Sputniknews.com/IMG/108604/eleven/108604eleven13_183:748:43eleven:3342_1920x0_80_0_0_236a6a6987fbc2839d7eb27c3a149472.jpg19201920trueSputnik Mundo contacto@Sputniknews.com+74956456601MIA „Rosiya Segodnya“25260Sputnik Mundo contacto@Sputniknews.com+74956456601MIA „Rosiya Segodnya“25260noticias12:47 GMT18.eleven.2019 (updated: 21:21 GMT 31.10.2021) CC by 2.0 / Maurizio Pesce / New Apple Airpods withone 7auricular AirPodSCC By 2.0 / Maurizio Pesce / New Apple Airpods withone 7sígue us in the headphones that use 'Bluetooth' instead of a cable to connect are good news for the 'hackers', as reported by cybersecurity specialists from the Purdue University in Iowa (USA).
In particular, smartphones are in danger with the Android operating system, since criminals can access them using the AT interface, which controls the wireless interactions of the devices, US researchers point out.
Cómo saber si la alarma de tu coche realmente lo protege de robos27 de septiembre 2019, 21:40 GMTPara hacerse con acceso al smartphone de su víctima, los maleantes envían unos determinados comandos a esta interfaz, momento en el que el celular pasa a tener conexión insegura, lo que les permite interceptar las conversaciones y acceder a los datos.This applies not only to the headphones, but also to the popular smart watches, according to Russian cybersecurity expert Alexéi Grift.The bad play that the user takes is possible because these small devices enter the so -called cell phone trusted zone, explained the expert.
In Mateprincs, Not Only Sell Inks, We Will Help You To Adapt Your Process to The Functional Printing.If you are ju ... https: // t.CO/P9WHBIOTJX
— Mateprincs Thu Jan 28 14:47:52 +0000 2021
Grishin added that headphones are especially attractive to computer pirates because through them you can intercept conversations without the victim realizing.And this is not the only danger of wireless headphones.
Después de leer esto, pensarás dos veces antes de conectarte a wifi13 de septiembre 2019, 21:15 GMTAsí, el analista jefe de ciberseguridad de la empresa Webroot, Tyler Moffitt, indicó que muchos celulares cuentan con una función de bloqueo inteligente que permite mantenerlos desbloqueados mientras están conectados a un dispositivo con bluetooth. Por lo cual, cuando con los auriculares de este tipo el teléfono es vulnerable a los ataques de los hackers.Fortunately there is something that everyone can do to better protect yourself from this threat: always install the latest updates of operating systems.According to specialists, developers keep the pulse to the vulnerabilities of their operating systems and frequently launch updates that protect them better.