You are viewing a single comment's thread from:

RE: Hackers Could Use Your Headphones to Spy on You

in #hack8 years ago

Copying/Pasting full texts is frowned upon by the community. Sharing content by itself adds no original content and no value.

Share content and add value by:

  • Using a few sentences from your source in “quotes.” Use HTML tags or Markdown.

For example this part of your text:

"Researchers like Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici have published a paper demonstrating its proof-of-concept software called SPEAKE(a)R. This software can easily turn any headphones connected to a PC or laptop into a microphone. In their video, they demonstrate an attack scenario where the malware can use a computer as an eavesdropping device, even when the microphone is not present, muted, taped, or turned off."

  • Include your own original thoughts and ideas on what you have shared.

Repeated copy/paste posts are considered spam. Spam is discouraged by the community, and may result in action from the cheetah bot.

Thank You!