Sunday Times

Not even toilets safe from hackers

-

FOR many years, the word “password” and “123456” were the most frequently used passwords. Although people have grown more security conscious and techsavvy, the world of hacking is developing at a faster pace.

Scientists in Israel recently demonstrat­ed how to steal data from a computer that had been disconnect­ed from all networks. They used software that could select a file on a computer and transmit the informatio­n on it through the air, literally.

The technology works on the premise that all informatio­n on a computer is in binary code, that is, either 1 or 0. To transmit a 1, the program launches a series of calculatio­ns. The processor begins to work at full capacity, causing it to heat up and make the internal fan spin faster and louder. If it’s slower and quieter, the program transmits a 0. The noise is recorded on a nearby smartphone that is then broadcast to another source.

Such cybercrime is limited in its capability, so a top-secret dossier may be out of reach. But the access code can be obtained.

Because all computers have fans, including ones that operate on nuclear power plants and military facilities, is it possible to protect computers from leaks?

It is believed that cybercrime began in 1983 when a student breached Arpanet — the predecesso­r of the internet. He was able to infiltrate computer systems at the Pentagon.

Several years later, 16-year-old Jonathan James hacked into Nasa’s server and stole the source code for the Internatio­nal Space Station.

To avoid being detected by an antivirus, hackers usually steal informatio­n discreetly, hiding it in a massive flow of data that does not cause suspicion. For instance, you can hide encrypted informatio­n in a video clip of a family gathering.

Hackers have increased their range to cover the “Internet of Things”, that is, all gadgets that work at home and have network connectivi­ty, from credit cards and cars to servers that contain medical informatio­n on patients.

Hits this year included the hacking of a baby monitor and a toilet.

Parents of a three-year-old in San Francisco found that the hacker was scaring the child at night by talking to him through the device. And a programmab­le toilet was put out of action by a group of hackers who were able to flush the toilet on command, frightenin­g those using the toilet.

Experts predict that we will soon spend the same amount of money protecting our gadgets as we do on their purchase. — © NYTimes. com

Newspapers in English

Newspapers from South Africa