Hacks and Glitches Portal
  • Home
  • Forums
  • Request Tool
  • Terms of Use
  • Privacy Policy
  • ABOUT US
  • Contact Us
No Result
View All Result
  • Home
  • News
  • Reviews
  • Tips & Tricks
  • Life Hack
  • Games
  • Photography
  • Security
SUBSCRIBE
  • Home
  • News
  • Reviews
  • Tips & Tricks
  • Life Hack
  • Games
  • Photography
  • Security
No Result
View All Result
Hacks and Glitches Portal
No Result
View All Result

How Hackers can Use Radio-waves to Gain Access to Your Smartphone Remotely

kalixto by kalixto
02/08
in Mobile, Mobile Hacks, News, Security, Wireless Hacking
Reading Time: 4 mins read
A A
25
Home Mobile
98.7k
SHARES
356.3k
VIEWS
Share on FacebookShare on Twitter

Hacking Smartphones Remotely is now Possible according to study

How terrible would it be if someone around you gains access to your smartphone and starts using it as if it’s theirs’? They would be able to make calls, send text messages, browse the Internet, and do much more without even actually taking it from you.

See also: How to Locate Someone’s Location using their Mobile Number

We know that it may not really sound something practically possible to you, but if results of the recent study conducted by French researchers are anything to go by, software such as Siri or Google Now on your smartphone can be used by hackers to gain access to it.

New hack that allows controlling others’ smartphones

Hacking Phone Remotely

In fact, these researchers have discovered such a hack themselves, and their entire study is based on how it works. What they managed to find is that if there’s a hacker around you who wants to gain access to your smartphone, they may be able to do so by transmitting radio commands. To your surprise, they don’t even need to utter word to give instructions to such software like Siri and Google Now, and they will still be able to use them.

What’s needed for the hack to work?

However, it’s also probably worth noting that the hacker needs to be within 16 feet from where you are, as if you are farther away, the hack may not be able to reach your smartphone, meaning that the commands they transmit wouldn’t be able to control the said software.

Furthermore, there’s another thing that’s needed for the hackers to control your smartphone, which is your headphones (micro-phone enabled) being plugged into its jack.

How it all works?

Frankly speaking, it seems a pretty interesting process the way this hack works. Basically, it uses just two things:

  1. iPhone or an Android phone with headphones (need to be microphone-enabled) plugged into the jack and a radio transmitter.
  2. The hackers use the radio transmitter to silently send voice commands to Siri or Google Now, depending on whether it’s an iPhone or an Android device.
  3. If you are within 16 feet of the hacker, the headphones will probably work as radio antennas, allowing the voice commands to control the apps using their micro-phone.

This can be done simply because the smartphone you may be using starts believing that the commands are actually coming from you, as the micro-phone is being used to give these commands.

Things hackers could access

There are quite a lot of things hackers could access on your smartphone using this hack, some of which have already been mentioned above. However, let us take a look at some of the most important of functions of your smartphone which they can use and exploit:

  • Making calls
  • Sending text messages
  • Browsing the Internet, including harmful and malware sites
  • Calling their own number, allowing them to eavesdrop on you
  • Spam your Facebook, Twitter, or email contacts

The French researchers also pointed out that though these may not be reasons tempting enough for someone to hack your smartphone, unless of course if they know you personally, there’s actually something even strangers might want to hack your smartphone for. This is because they can even call a paid number using it, which can make them quite a bit of money each time they do it.

Video Demonstration

Video demo by thehackernews.com

ShareTweetPin
Previous Post

[GET] 10 Amazing WordPress Navigation Menu Bars + Full Script

Next Post

The USB Stick That Can Kill Someones PC – USB Killer v2.0

Related Posts

Instagram Location tracker 02

TUTORIAL: How I Tracked Someone’s Location using Instagram

03/19
Bitcoin downtrend

Cryptocurrency is trending downwards. Is this a good time to buy in?

06/26
High capacity 1.5tb sdcard

1.5tb microSD Card Is Just Around The Corner

06/27
SpaceX is Set to Launch Four NASA Astronauts to ISS

SpaceX is Set to Launch Four NASA Astronauts to ISS

04/22
Next Post

The USB Stick That Can Kill Someones PC - USB Killer v2.0

Comments 25

  1. Nunuadabla says:
    9 years ago

    Very gooood

    Reply
    • NebulaNavigator says:
      2 years ago

      Keep up the amazing work! Your method has saved me countless hours of frustration.

      Reply
      • CreatureTrainer says:
        2 years ago

        Fantastic job on this method! It’s incredibly insightful and helpful.

        Reply
        • TsunamiRider says:
          1 year ago

          Wow, this method is incredible, thank you so much for posting it.

          Reply
          • WildWorldRanger says:
            1 year ago

            This method is seriously game-changing, thank you for sharing it.

          • ThrowingNinja says:
            1 year ago

            Your method’s step-by-step instructions make it easy to apply even in high-pressure situations. I’m so grateful for this!

        • CosmicMaster says:
          1 year ago

          I’m so thankful for this life-changing method, thank you for posting it.

          Reply
    • GreenGoddess says:
      2 years ago

      I’m so grateful to have come across this method, thank you for posting it.

      Reply
    • TechnoTitan says:
      1 year ago

      Your method has helped me achieve results that I never thought were possible. Thank you!

      Reply
    • SpellWeaverQueen says:
      1 year ago

      The method has completely shifted my perspective, thank you.

      Reply
    • LightningStrike23 says:
      11 months ago

      The method has totally changed my perspective, thank you.

      Reply
    • ShadowDancer93 says:
      9 months ago

      Thank you so much for the method, it works perfectly!

      Reply
  2. CuisineQueen96 says:
    2 years ago

    I appreciate the thoroughness and clarity of your approach. This method is excellent!

    Reply
    • WordWizardMage says:
      11 months ago

      This method has completely transformed the way I do things, thank you.

      Reply
  3. GreenGoddess says:
    2 years ago

    This method has completely transformed my approach to problem-solving. Thank you for sharing your expertise!

    Reply
    • NetNinja12 says:
      2 years ago

      Your method has helped me achieve results that I never thought were possible. Thank you!

      Reply
  4. FoodGod100 says:
    2 years ago

    I’m so thankful for this method, it’s seriously making a huge difference in my life.

    Reply
  5. AnimalKingdom says:
    1 year ago

    Your method is not only effective, but also inspiring. It’s made me realize that there’s always a better way to approach problems.

    Reply
  6. MasterOfLetters says:
    11 months ago

    I’m so happy with the method, it’s working wonders for me.

    Reply
  7. FlavorCrusader says:
    11 months ago

    I cannot express how grateful I am for your expertise. Your method is a lifesaver!

    Reply
  8. LightningRider23 says:
    11 months ago

    Your method provides a clear roadmap to achieving success in X. I feel confident and empowered thanks to your guidance.

    Reply
  9. [email protected] says:
    6 months ago

    There are new applications that are used for hiding chats and all other apps on phones lately. I never knew about this until I was introduced to tomcyberghost[a]gmail com and I hired him to help me check, hack, and monitor my cheating spouse’s cell phone remotely. It was with his help got to know my spouse was cheating on me with this same application to hide most of the chats on the cell phone but immediately I contacted this ethical hacker he helped me break into it and I was able to read and monitor all the day to day activities through my cell phone. I will forever be grateful to this honest and trustworthy hacker. If you are facing any infidelity problems in your relationship or marriage you can contact him. He will provide all the help you needed for you. Contact him via Email: at [email protected] Text/Call and WhatsApp at +1(404) 941- 6785 to tell him i referred you.

    Reply
  10. [email protected] says:
    5 months ago

    when it comes to hacking. He will picture the best for you who actually needs his help, be careful of whom you contact to help you, he is a special hacker which has his own ways of hacking that nobody has ever imagined in thishacking world with his spare idea he can hack anything. He is totally secured and your security comes first.Hacking a website is a job for pros like MR FRED1-Change school grade. Bank jobs, flipping cash, hacking and controlling any robot.2-Database hack. Remove criminal records. Facebook hack. 3-gmail hack 4-whatsapp hack 5-website hack 6-tracking calls 7-online hacking lectures 9-Cloning of phones10-online records changes11-Twitter hack12 calls log And lots more. Contact [email protected] and you can text,call and whatsapp him on +15177981808 or +19782951763

    Reply
  11. [email protected] says:
    5 months ago

    I was able to catch my cheating husband red handed with a lady he has been having a love affair with and this was made possible by Fred hacker that I met through a comment posted by Kimberly Jane on Reddit about his good and professional services. I started getting suspicious of my husband since he became too possessive of his phone which wasn’t the way he did prior before now. He used to be very carefree when it comes to his phone. but now he’s become obsessed and overtly possessive. I knew something was wrong somewhere which was why i did my search for a professional hacker online and contacted the hacker for help so he could penetrate his phone remotely and grant me access to his phones operating system, he got the job done perfectly without my husband knowing about it although it came quite expensive more than i thought of.i was marveled at the atrocities my husband has been committing. Apparently he is a chronic cheat and never really ended things with his ex.. contact him here. [email protected] and you can text,call and WhatSapp him on +15177981808 or +19782951763

    Reply
  12. [email protected] says:
    3 months ago

    My husband has been frequently deleting all messages for the last couple of days from his phone and he didn’t know i was peeping at him, then i asked him why he was deleting all messages from his phone but he claimed that his phone memory was full and needed more space. Immediately I went in search of a hacker who can get me deleted information and contents from my husband’s phone and luckily for me i came across this reputable ethical hacker Mr Fred, this hacker got the job done for me and provided me with results and i saw that my husband has been lying to me. He was simply deleting all pictures, call logs, chats and text messages between him and his secret lover so i wont get to see what he has been doing at my back. Thank God for reputable hackers who are ready to help. I must say am really impressed with the services i got from The hacker Detective and am here to say a very big thank you: contact him on [email protected] and you can text,call him on +15177981808 or +19782951763

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Home
  • Forums
  • Request Tool
  • Terms of Use
  • Privacy Policy
  • ABOUT US
  • Contact Us
Email Us at [email protected]

© 2021 Hackolo.com - Hacks and Glitches Portal HACKOLO.

No Result
View All Result
  • Home
  • News
  • Reviews
  • Tips & Tricks
  • Life Hack
  • Games
  • Photography
  • Security

© 2021 Hackolo.com - Hacks and Glitches Portal HACKOLO.

en_USEnglish
fr_FRFrançais es_ESEspañol de_DEDeutsch nl_NLNederlands ro_RORomână en_USEnglish