The security of our mobile devices has become a growing concern due to the large amount of personal information stored on our mobile devices. As technology advances, cyber criminals are also finding new ways to attack our phones. Recently, a hacking method called GhostTouch that does not require virus installation has attracted the attention of users. However, as alarming as this sounds, it is important to understand that the threat is not as serious as you may initially think.
Not a virus, but with a peculiar way
GhostTouch is a hacking method discovered by researchers from Zhejiang University in China and Darmstadt University of Technology in Germany. Unlike traditional attacks that use a virus to control a device, GhostTouch relies on the use of electromagnetic signals to simulate gestures on the target phone. These gestures can be movements such as swiping or tapping on the screen, allowing hackers to remotely control the device without the user’s knowledge.
Limitations that reduce its effectiveness
While GhostTouch may seem like a worrisome threat, it’s important to note the significant limitations it presents. First, hackers need to be in physical proximity to the device, at most 40mm away. This means that the attack cannot be carried out remotely, which significantly reduces its reach and makes it difficult to implement on a large scale. Also, this method of hacking goes unnoticed. If the user is watching the screen of their phone being controlled remotely, they may see strange movements or the device may behave abnormally. These red flags can alert the user that their phone has been compromised and therefore take additional security measures.
Importance of lock screen security
Another important factor to keep in mind is that GhostTouch only affects phones that are unlocked or don’t have security measures like a PIN, pattern, fingerprint, or facial recognition on the lock screen. If your phone has any of these security measures, you are on a much safer level against this type of attack. It is essential to make sure that you use at least one of these options to protect your device and prevent unauthorized access.
While the discovery of Ghosttouch may raise concerns, it is important to remain calm and properly assess the level of risk it poses. While any security threat should be taken seriously, GhostTouch requires physical proximity to the device and is not a discreet method.
The important thing is not to leave our mobile phones unlocked without supervision on a table at the bar, although we already do that, don’t we?