Jump to content
  • The new vulnerability turns smartphones and laptops into acoustic weapons

    Smartphones and laptops have long been perceived by users as harmless devices for content consumption, work, and entertainment. But a recently published study indicates that these gadgets can be used by attackers not only as objects of hacking but also as a dangerous weapon.

    The new vulnerability turns smartphones and laptops into acoustic weapons

    Specialist in the field of cybersecurity Matt Wixey published the results of a study he found the vulnerability of a number of electronic devices. Weak points of smartphones, laptops, Bluetooth-speakers, wireless headphones, and Handsfree systems, the researcher called the possibility of hackers to access the settings of gadgets.

    By gaining appropriate access, an attacker can implement an algorithm to continuously play deafening or disorienting sounds at high or low frequencies, thereby harming human health.


    "Some attacks have used known vulnerabilities on a particular device and can be implemented locally or remotely. Other attacks require either proximity to the device or physical access to it," the researcher said.

    For the implementation of the attack is sufficient to have a Wi-Fi or Bluetooth connection. Wixey tested his hypothesis in practice by hacking several devices through a scanner program and forcing them to play sounds-stimuli through the built-in speakers. In one of these experiments, the forced reproduction of such sounds led to the failure of the gadget. The expert noted that the testing was carried out in a soundproof room, and no one was involved in the series of experiments.

    User Feedback

    Recommended Comments

    There are no comments to display.

    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.