您的当前位置:首页 >娛樂 >【】TopicsAppleCybersecuritySamsung 正文
时间:2025-12-24 16:10:59 来源:网络整理编辑:娛樂
Yeah, so this isn't good.。 What if the very act of tapping your smartphone's passcode was all it too
Yeah, so this isn't good. 。
What if the very act of tapping your smartphone's passcode was all it took to expose that code to hackers?
Are you sitting down right now? You should probably sit down.。
SEE ALSO:Put a lock screen on your phone, sheeple!。Remember that story on how fingerprint locks on smartphones can be duped? And that Samsung's facial recognition system can be tricked with a photo of a person?

Well, as more and more of our personal data is stored on smartphones, the ways of securing those phones continue to be revealed as less and less robust. Next on the chopping block is your trusty PIN. 。
Thanks for signing up! 。 Modern smartphones come equipped with tons of sensors: cameras, microphones, GPS, accelerometers, gyroscopes, etc. According to a new study published in the。Journal of Information Security and Applications。
, this data in aggregate is precise enough to determine what actions a user is taking with her phone — right down to the password she taps to unlock it.。
A little malicious code plus the sensors that come standard on most smartphones is apparently all that it takes these days to render your phone's security moot.。
The study authors haven't found this attack in the wild, but rather demonstrated that it works. Which, frankly, is scary enough. As Wikileaks' dump of alleged CIA hacking tools has shown, known attacks have a way of getting passed around.。
"Our study confirms that embedded JavaScript code can compromise user sensitive information by listening to the side channel data provided by the motion and orientation sensors without any user permission, through an inactive tab, iframe, or minimised browser (even when the screen of the mobile phone is locked)," wrote study co-author Dr. Maryam Mehrnezhad on the Newcastle University blog. "We demonstrate the practicality of this attack by collecting data from real users and reporting high success rates, up to 70% identification of digits (PIN) in Android and 56% in iOS." 。
A lot of browsers are susceptible, including Chrome, Firefox, and Safari. That means you don't even have to click a weird link or download a strange file to accidentally leak your taps to a malicious hacker or government official.。
Featured Video For You。
Photos show the Blue Cut fire blazing a path of destruction in California2025-12-24 15:59
張稀哲:體能上我們還可以 夏天已經感受過這種賽製2025-12-24 15:08
鄭智喜迎執教首勝 廣州本土將士打出“八冠王”風采2025-12-24 15:02
姆巴佩模仿C羅百球慶祝動作 曼聯球迷:快簽下他2025-12-24 14:14
Donald Trump's tangled web of Russian influence2025-12-24 14:12
解散?曝曼聯7星冬窗逃離夢劇場 朗尼克恐陷用人荒2025-12-24 14:09
孤立無援的奧斯卡射失點球 海港0射正輸球爭冠無望2025-12-24 13:46
艾哈邁多夫:有開始就會有結束 相信烏茲別克能進世界杯2025-12-24 13:39
Felix the cat just raised £5000 for charity because she's the hero we all need2025-12-24 13:33
經紀人:埃裏克森將繼續踢球 有四家俱樂部感興趣2025-12-24 13:27
Despite IOC ban, Rio crowds get their political messages across2025-12-24 16:05
廣州城5球大勝北京國安 創隊史中超最大贏球比分紀錄2025-12-24 15:38
鄧涵文 :賽前鄭智要求大家全力以赴 球隊表現越來越好2025-12-24 15:24
真躺著中槍?米蘭絕平球被吹 竟因倒地的吉魯越位2025-12-24 15:23
Xiaomi accused of copying again, this time by Jawbone2025-12-24 15:16
桑一非製勝球!武漢12025-12-24 14:48
劉智宇:廣州隊的能力依然在 目前還沒達到全隊預期2025-12-24 14:47
19日賠率 :熱刺難敵利物浦火力 藍軍米蘭需防丟分2025-12-24 14:41
J.K. Rowling makes 'Harry Potter' joke about Olympics event2025-12-24 14:26
巴薩VS埃爾切首發 :登貝萊德容領銜 B隊小將出戰2025-12-24 13:34