{"id":2745,"date":"2016-08-08T16:47:01","date_gmt":"2016-08-08T21:47:01","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=2745"},"modified":"2016-10-19T17:27:43","modified_gmt":"2016-10-19T22:27:43","slug":"phone-can-hacked-even-offline","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/phone-can-hacked-even-offline\/","title":{"rendered":"Your Phone Can be Hacked Even When it\u2019s Offline"},"content":{"rendered":"<p>It\u2019s not always easy to tell if hackers have gotten ahold of your personal information, but you probably don\u2019t think much about safety if your phone isn\u2019t connected to the internet. Unfortunately, you better think again. There are some clever ways hackers can gain security access to your information even if your phone isn\u2019t online. Here are just a few examples.<\/p>\n<p><strong>Electromagnetic Radiation<\/strong><\/p>\n<p>Beware of plugging in your phone to charge it. When plugged in, your phone lets off electromagnetic radiation that can be tracked. Although a hacker has to be relatively close to your phone \u2014 within 67 feet \u2014 to gain information, he or she can use a device that detects your phone\u2019s radio spectrum and tracks your keystrokes. As you can imagine, your keystrokes could give away highly-classified personal information.<\/p>\n<p><strong><a href=\"https:\/\/www.psafe.com\/en\/blog\/tell-android-hacked\/\" target=\"_blank\">Read More: How to Tell if Your Android Has Been Hacked<\/a><\/strong><\/p>\n<p><strong>Accelerometers<\/strong><\/p>\n<p>Your accelerometer \u2014 the sensor in your phone to track tilt and motion \u2014 can be used to detect typing. When used close to a computer, the accelerometer has a nearly 80-percent accuracy of keystroke detection.<\/p>\n<p>That\u2019s not the only type of hacking the accelerometer is used for, either. This kind of data might not be the typical data hackers want, but did you know that your smartphone, even when it\u2019s disconnected, can give away your location? Hackers can follow your movements if you\u2019re traveling on an underground train. Each bump and the duration between each stops can be monitored by an accelerometer to give away your location.<\/p>\n<p><strong>Lasers<\/strong><\/p>\n<p>Another way hackers read your keystrokes is by aiming a laser at a smartphone keyboard to track its vibrations. While this method is technically more accurate than using the accelerometer, the laser has to be directed towards the part of the phone that reflects light.<\/p>\n<p><strong>Power Consumption<\/strong><\/p>\n<p>Load Monitoring is a way to watch voltage and current changes to figure out a person\u2019s connected activity. The technique is typically used by electricity companies to monitor electricity usage in specific places. However, it has also been used as a way to determine which device is running at each time. It also has the potential to be used by hackers to see which devices they have successfully infected with malware.<\/p>\n<p>These are crafty, spy-level hacks to think about, and they might not happen to you personally. But common hacks do happen all the time. Make sure you keep your phone safe with <strong><a href=\"https:\/\/www.psafe.com\/en\/antivirus-acelerador-limpeza-android\/total\/\">PSafe Total<\/a><\/strong>. PSafe Total\u2019s Antivirus works 24 hours a day, seven days a week, to keep your phone safe from <strong>security<\/strong> breaches.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You might think your phone is protected from hackers if you\u2019re not on the internet, but these crafty hacking techniques will make you think twice.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[1945,259,182,218,545,249,161],"class_list":["post-2745","post","type-post","status-publish","format-standard","hentry","category-security","tag-hacked-phone","tag-hackers","tag-malware","tag-privacy","tag-safety","tag-security","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/2745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=2745"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/2745\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=2745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=2745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=2745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}