• Total Members: 12780
  • Latest: eduard
  • Total Posts: 28039
  • Total Topics: 8052
  • Online Today: 817
  • Online Ever: 51419
  • (01. January 2010., 09:27:49)

Author Topic: Digital Stalking: Physical Eavesdropping on Your Mobile Device  (Read 840 times)

0 Members and 1 Guest are viewing this topic.


  • SCF VIP Member
  • *****
  • Posts: 712
  • KARMA: 114
  • Gender: Male
  • Pez
Digital Stalking: Physical Eavesdropping on Your Mobile Device

Did you know that while you innocently play games or browse Facebook on your smartphone or tablet, someone might be tracking your every move?  Through a stream of data “leaked” by your mobile gadgets, cybercriminals can determine which direction you’re headed, how fast you’re walking and how long your strides are. Leaked data can even tell hackers whether you walk or take the subway to work or where you put your phone down when you get home.

Creepy, right?

McAfee’s latest white paper reveals details about a new type of HTML5 data leakage called physical eavesdropping that allows hackers to use your mobile device to access detailed information about your everyday life.

How Does it Work?

The technology that most of today’s smartphones and tablets are equipped with is designed to improve the mobile experience and ultimately make our lives easier. For example:

• Accelerometers are used to present landscape or portrait views of a device’s screen, based on the way the device is being held.

• Gyroscopes are used for measuring or maintaining orientation and provide users with a richer experience when they’re playing mobile games.

• Compasses allow the gadget to sense exactly what direction it’s facing.

• HTML5-compliant web browsers allow for greater functionality and improve the user’s mobile web experience.

The flipside is that hackers use these technology features to collect and analyze the directional and orientation data of mobile devices. That data is then translated into human motions giving cybercriminals the opportunity to obtain physical information about you and your device – which is where the notion of “physical” eavesdropping comes in.

For example, McAfee Labs found that it’s easy to detect whether a phone is placed on a tabletop or a charging dock. And while that may not seem like a huge red flag, it’s really just the tip of the iceberg.  Detection becomes more complex and disturbing when things such as posture, step strides, and variances in clothing are taken into account. McAfee discovered that hackers can determine whether users are carrying their phone in their pocket or their hands while they walk. They can calculate the length and pace of a user’s steps, which reveals an approximate height of a target and potentially indicates whether a child or an adult is using a device.

When the information gathered through a physical eavesdropping attack is combined with a standard location-based attack, a stalker can capture a sequenced view of someone’s daily routines and schedule. The hacker can extract GPS coordinates, device orientation, acceleration and directional data to determine the exact physical position of a mobile device. When all the pieces are put together a stalker can find out if a user is sitting outside at a coffee shop with their mobile device lying flat and facing north while they browse through their Instagram feed.

Who’s At Risk?

Apple users listen up – this attack is not an Android-specific hack. Users across both platforms are vulnerable as are all popular devices – everything from the iPhone 5 to the Samsung Galaxy S3 – are at risk. Hackers would most likely perform this attack via a third-party web app or within emails, specifically a web-based email such as Gmail. The scariest part though, is that it’s fairly easy to carry out, so we’re all at risk. It could be used by jealous boyfriends or girlfriends spying on their better halves, or a “modern day” stalker attempting to learn a target’s every move. Perhaps the paparazzi could even use this to track down popular celebrities.

How to Best Protect Yourself

Currently, most mobile devices are not equipped with an easy way for users to restrict access to the motion and orientation data being leaked by our everyday activities – whether it’s playing a game, checking emails or checking movie times at your local theater. However, while the ultimate fix for this hack lies in the hands of mobile OS developers, there are ways to reduce the risk of vulnerability. It’s important to make sure you’re using a mobile security solution so you aren’t an easy target for hackers. By using a security solution that allows you to block access to certain types of data through safe searching and app use, you will avoid leaving a data trail that would allow hackers to piece together a comprehensive picture of your every move.

Orginal article: Thursday, April 18, 2013 at 8:00am by Luis Blando
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing !,8405.msg21475.html#msg21475

Samker's Computer Forum -


With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters)

Enter your email address to receive daily email with ' - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising