Some very convenient “devices” can be transformed into hacking tools, and not at all because the user carelessly downloaded malicious software.
11 0
About the fact that, according to a new study conducted by specialists from the University of Florida and IT cybersecurity experts from the company CertiK, a serious vulnerability was identified in wireless chargers, writes NBN.
As it became known, cyberterrorists are able to redirect electromagnetic pulses that are generated by charging stations to cause damage, including hacking, for devices running on both iOS and Android, not excluding an increased risk of overheating batteries of the “gadget” to critical temperature conditions, which can lead to its ignition.
In particular, the problem lies in the fact that attackers manipulate the flow of electricity entering the charger, forming a similar “interruptions”, which are then used to adjust the density of the magnetic field required for charging, without physical intervention in the device itself, but only through changes in the intensity of inputs from the electrical network.
In addition, this method can be used to activate hidden voice commands on a smartphone/tablet, opening the way to gaining full control—hackers will “leak” personal data (passwords/logins) into the Network or even directly destroy the device by overheating.
Previously we  ;wrote about that experts named the 6 best Android smartphones as of February 2024 .