6 ways hackers can break into your devices

Ncrypter
Ncrypter Magazine
Published in
5 min readAug 28, 2017

There are various reasons why hackers would want to steal your data- whether they do it for fun or there’s the financial gain if sold. Although it may sound like attacking big companies is more worthwhile for them, individuals’ personal devices are also at risk. You might already feel prepared against computer viruses, social engineering scams, and Wi-Fi hackers. Unfortunately, even the most cautious person is susceptible to a cyber attack. For every prevented hacking attempt, there are a lot of other methods scammers can use to break into your system.

We’ve outlined below six of the devious methods hackers use to infiltrate in mobile devices, cameras, and even cars and how you can prepare for them.

1. Hacking into an isolated computer

In order to protect their sensitive files, many companies and people store these on a computer disconnected from all networks (isolated network), the thinking behind it being that the hacker won’t have an access point to it. Well, they did find a workaround for hacking isolated computers.

AirHopper is a keystroke logging app that works by intercepting radio signals from a computer’s monitor. The FM signals can then be converted to text, such as usernames, account numbers, passwords, credit card numbers, and social security. Neither direct access nor an internet connection is required to trace keystrokes, though the device has to be within roughly 20 feet of the target monitor.

2. Auto-Hacking with a USB drive

With a little help from a clever USB drive, hackers can easily break into a locked computer. An auto-run program on the drive activates the moment the stick is plugged into a computer. Some install viruses and backdoors to give the hacker route access to a locked computer. Other programs extract data and passwords for the hacker to break into the user’s online accounts.

All the hacker has to do is plug the USB drive into a computer for a few minutes, remove it, and walk away without leaving any evidence behind. Though the hacker needs physical access to the computer, plug-and-hack devices are one of the most effective mechanisms for breaking into a password-protected computer.

3. Using androids as hacking tools

As technology advances, hacking becomes so streamlined that even someone without much technical expertise. All they need to do is install an app onto their Android phone and use it to hack through Wi-Fi or servers to steal passwords.

While these tools aren’t as dangerous as more complex techniques, they’re accessible tools for new hackers to partake in cyber crime.

4. Spying through cameras

Phone or laptop inbuilt cameras serve us well in our day to day life when taking pictures or video-calling our friends. But sometimes, even though the light indicator looks off, there might be someone else peering through it. Hackers can spy on you and your house through any camera that’s connected to your home network. They can record footage or take pictures of whatever they see.

There are steps you can take to prevent them from taking control of your cameras, such as:

  • Ensure your network is protected by a secure network, anti-virus software, and a powerful firewall that will block outside access.
  • Change the passwords on your cameras. They may still be set to factory default settings, which is public knowledge. Criminals can simply search for the password on a forum and gain access to your footage.
  • Deactivate any webcams and cameras not in use — you can always turn them back on when the need arises.

5. Intercepting car key FOBs

Although keeping your car’s key FOB in your pocket or purse is a safe way to prevent anyone else unlocking your vehicle, when you push the button to unlock your car, there might be a radio device nearby copying and recording the signal. The hacker can then recover the gadget and break into the car or garage whenever they feel like it, be it hours or weeks later.

Most of the devices that unlock electronically can be hacked this way. Since the hacking tool is hidden from sight, there isn’t an easy way to tell if your signal is being recorded.

If your vehicle fails to unlock when you first press your FOB, don’t press it again — you’ll be giving the hacker exactly what they want, allowing them to record the latest code. You should try searching the area around and under your car for a suspicious device or alert the authorities.

6. Hacking smartphones and mobile devices

Nowadays smartphones play a major part in our every day life and are used to connect socially, make payments, manage accounts, and more, making them a great target for identity thieves. By accessing your phone, a hacker can get access to your account numbers, passwords, social security, contacts, social media profile, schedule, and even your current location.

Phones are as susceptible to cyber attack as computers, with millions of mobile devices being hacked every year. Just like with computers, hackers use infectious software known as mobile malware- visits to insidious sites which automatically download malware onto your phone; or scam emails posing as security updates will install malicious software that will give the hacker control of your phone.

No matter how sophisticated cyber security becomes, hackers will always look for cracks in the armour to take advantage of. Cyber criminals are constantly coming up with new and unique strategies for slipping past software defences. Make sure you stay aware of the ongoing tug-of-war between hackers and security systems, and always look for information and advice to better protect yourself against cyber attacks.

--

--

Ncrypter
Ncrypter Magazine

Security researcher, crypto enthusiast, entrepreneur