• About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form
Tuesday, May 20, 2025
  • Login
No Result
View All Result
NEWSLETTER
BOB fm
  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form
  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form
No Result
View All Result
BOB fm
No Result
View All Result
Home Tech

The phone unlocks itself? Beware, you may fall victim to this attack!

Fred Foster by Fred Foster
June 8, 2023
in Tech
0
The phone unlocks itself?  Beware, you may fall victim to this attack!
0
SHARES
13
VIEWS
Share on FacebookShare on Twitter

The recent wave of smartphone attacks is raising concerns around the world. Affected users blame the fact that the smartphone unlocks itself, which is one of the main symptoms that our smartphone may have been hacked.

When you search for the phrase “auto unlock phone” over 209 million results come up on Google and it’s not an error or insect. In fact, experts believe this may have been caused by an attack GhostTouch.

the pirate Screen or GhostTouch is the new wave of attacks

GhostTouch is the latest screen hacking attack that allows criminals to access mobile phones remotely. In simple terms, hackers use electromagnetic signals to simulate elementary actions such as clicks and swipes on strategic areas of a touchscreen.

Again, the goal is to remotely access and manipulate smartphones in potentially dangerous ways (access to data or passwords, access to insecure services, or install malware). The ultimate goal is always easy profit.

This is how the attack works the pirate number of screens

according to detectives From Zhejiang University (China) and Technical University of Darmstadt (Germany), screen hacking attacks use “electromagnetic interference (EMI) to inject false touch points into the screen.” touches. This without having to touch it.

These types of attacks operate from 40mm away, and take advantage of touchscreens’ sensitivity to electromagnetic interference. In fact, criminals can inject electromagnetic signals into the electrodes that are part of touch screens and record them as touch actions (short presses, swaps, presses, or long presses).

The attack has been proven to work on nine smartphone models, including the iPhone SE (2020), Samsung Galaxy S20 FE 5G, Redmi 8, and Nokia 7.2.

These are the signs of a “hacked” smartphone.

If the user’s screen is hacked, it will start working on its own. For example: opens automatically Or answer calls without being asked by the user.

Another sign of a hacked cell phone is that it starts opening random URLs. Or even logging into a user’s bank accounts, opening files, and playing videos. Or even typing words into the search box without the user’s consent.

Criminals can also try to create malicious connections to launch attacks man in the middle Or manipulate the phone with a Bluetooth mouse.

So, if you notice any unusual Bluetooth or Wi-Fi connections, it is likely that your phone has been hacked.

3 ways to protect yourself from screen hacking attacks

  1. Add an extra layer of security. In addition to strong passwords, enable advanced security measures such as facial recognition, fingerprints, or PINs for high-risk actions (such as money transfers). This will help prevent financial loss even if you fall victim to a screen hacking attack.
  2. Keep your phone’s operating system up to date. Updates provide essential security features that can reduce the risk of attack. These vulnerabilities are minimized and may also contain additional features specifically designed to protect the mobile phone from this type of attack.
  3. Use anti-malware software. Using anti-malware software does not stop screen hacking attacks, but it does make criminals unable to install malware on a device if they gain control of it.

The 4gnews editors recommend:

Fred Foster

“Friendly zombie fanatic. Analyst. Coffee buff. Professional music specialist. Communicator.”

Fred Foster

Fred Foster

"Friendly zombie fanatic. Analyst. Coffee buff. Professional music specialist. Communicator."

Next Post
Fruit increases fat mass and immunity |  capital Cities

Fruit increases fat mass and immunity | capital Cities

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Navigate

  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form

Pages

  • About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form
  • About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • About Us
  • Contact Form
  • DMCA
  • Editorial Policy
  • Privacy Policy

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.