HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

Malware That’s Transmitted Through Sound

NO RATINGS
View Comments: Newest First|Oldest First|Threaded View
<<  <  Page 3/3
Nancy Golden
User Rank
Platinum
Re: New Threat
Nancy Golden   12/18/2013 12:45:37 PM
NO RATINGS
That is a very good point 78RPM - I am just wondering what justified a full blown effort at developing malware when as they have stated, "However, the scientists have divulged several counter measures that can be put into place to nullify acoustical intrusions, with one being simply to shut off the PCs audio input/output devices. Another method is to install audio filters that are capable of blocking certain high frequency ranges that are used to transmit covert data."

It seems to me that developing countermeasures against known audio technology would not require creating malicious code to test it - audio sent at different frequencies could have provided the same stimulus.

78RPM
User Rank
Gold
Re: New Threat
78RPM   12/18/2013 12:38:18 PM
NO RATINGS
I'm taking the Digi-Key Design News class this week on SCADA Security. The instructor Clint Bodungen states that by the time a vulnerability goes public, it has already been in circulation. Publicity is important because it lets the "good guys" know about possible attacks from the "bad guys."

Nancy Golden
User Rank
Platinum
Re: New Threat
Nancy Golden   12/18/2013 9:52:25 AM
NO RATINGS
I agree, Elizabeth. It puzzles me as to so much time, money, and energy being directed at developing something that seems to say - yes - this can be done. As with any malicious software - the nature of the beast must be known in order to institute countermeasures but was it really necessary to conduct all of that research and develop their own algorithm? Now hackers are aware of audio possibilities they may have not considered before.

Elizabeth M
User Rank
Blogger
New Threat
Elizabeth M   12/18/2013 8:54:56 AM
NO RATINGS
Well this is fascinating technology but we don't really need another way for malware to be transmitted, do we? It's good to know people don't have to worry about this quite yet nor that much data can be transmitted this way. But who knows what can happen if a clever hacker gets ahold of it and messes with the code.

<<  <  Page 3/3
Partner Zone
More Blogs
Researchers in Canada have developed a chin strap that harvests energy from chewing and can potentially power a digital earplug that can provide both protection and communication capabilities.
In case you haven't heard, the deadline to enter the 2014 Golden Mousetrap Awards is coming up fast – Oct. 28! Have you entered yet?
Enabling the Future is designing prosthetic appendages modeled more like superhero arms and hands than your average static artificial limbs. And they’re doing it through a website and grassroots movement inspired by two men’s design and creation in 2012 of a metal prosthetic for a child in South Africa.
In order to keep an enterprise truly safe from hackers, cyber security has to go all the way down to the device level. Icon Labs is making the point that security has to be built into device components.
Three days after NASA's MAVEN probe reached Mars, India's Mangalyaan probe went into orbit around the red planet. India's first interplanetary mission, and the first successful Mars probe launched by an Asian nation, has a total project cost of nearly $600 million less than MAVEN's.
Design News Webinar Series
9/25/2014 11:00 a.m. California / 2:00 p.m. New York
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
10/7/2014 8:00 a.m. California / 11:00 a.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 20 - 24, How to Design & Build an Embedded Web Server: An Embedded TCP/IP Tutorial
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: October 2
Sponsored by Altera
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service