Hackers Using Motion Trackers to Your Phone


Most of the people do not think before unlocking their smart phones. According to the new study, which is headed by Dr Maryam Mehrnezhad of Newcastle University, UK showed the ways you hold your phone and it is enough to hack their phone. With the use of motion tracker of the phone, the hacker can take control over the contents of the smart phone.

5th Time’s the Charm?

The research scholars told the method, which is utilized to hardware-tracking sensors on the device with the accelerator and gyroscope and it recognizes the tilt of the phone, when they entered its pin. This first attempt has the success rate of 70% and after about 5 tries, the success rate reaches to 100%.

When most of the websites and apps require permission for accessing the sensitive information and sensors on the phone like camera, GPS and microphone, the data of the motion sensors is not considered private, when you give enough permission to all. Most of the researchers have identified about 25 sensors to relay the information to outsiders without any problem.

Can Access Everything

With the use of information on the motion sensors, the hackers can track the user and they analyze their whereabouts and also know the PINs and passwords and the track touch actions. In case of website, it is very easy to insert the malicious code and they can get the access to the sensitive information of the user while tabs are still open.

The hackers utilized the method, which is low and it is given to the number of systems required to bypass and the amount of data, which is needed before when they can accurately figure out the password. There are the possibilities that happens are quite limitless.

Difficult to Patch Out

The researchers of the university have already highlighted the issue to the smart phone industry leaders and the World Wide Web consortium. Mozilla is already working on this issue to resolve it. There is shortage of the standard procedure to decide to get the access to the sensors and it will be difficult to reach to the comprehensive solution of the vulnerability.


Comments are closed.