Skip to main content

As modern technology progressed over the years, there has been an exponential growth of users, applications, and the IoT.

Almost everything in our homes or offices are devices that can be connected to the internet, and this has brought us both an advantage and disadvantage. Having the ability to connect to an open network can be used as leverage by hackers to intrude on our privacy. 

IoT devices have recently become a subject of a new type of cyberattack where it uses laser beams or light commands to hack them. By pointing it at a target device, it can remotely penetrate the device using invisible and inaudible instructions. 

In this article, we will be promoting cybersecurity awareness on laser light commands that can access your IoT devices and softwares.

How does it work?

There are IoT devices that are vulnerable to electrical signals. The hacking works closely to that of receiving audio or transmission. It modulates the light amplitude to produce an acoustic pressure wave, triggering the device or accessing it.

Light Commands

IoT devices such as smartphones, tablets, and computers, including voice assistance software are vulnerable to light-based attacks. This includes other devices that have a MEMS microphone. 

There are research and a successful attempt in which the use of a Google Home device and a laser, through a telephone lens can open a garage door with a remarkable distance of 350 feet.

It was also tested in other devices which were then shared with the developers and manufacturers so that proper security measures are placed and necessary solutions are given.

The light attack can vary depending on the intensity of the light and laser power. Other devices can reduce the intensity of the attack by its physical barriers. The device built can reduce the absorption of ultrasonic waves.

Why hackers love this

Hackers will love to have the power to exploit vulnerabilities in smartwatches, IoT home devices such as doors or locks, remote devices, and online commercial products. 

By using this method they will no longer have to go through technicalities in penetration, all they need to do is be present or near the device. Once connected, hackers can use the information that they gain to access other confidential accounts that you have. 

How to stay safe from light command

Manufacturers and developers are surely prepared to release new software and security updates on this particular issue. Other than that, multiple layers of authentication and authorization would also be helpful. 

If you have devices that are hard to update on software security, you can always physically block the point of entry on the voice assistant or transmission to prevent receipt of external commands.

Cybersecurity role in advanced attacks

Cybersecurity is an industry that does not only focuses on the challenges and battle against cybercriminal activities but also focuses on the innovation of cybersecurity tools and methods in the prevention and management of incidents. 

Advanced methods of attacks such as this will require the assistance of professional and skilled people in the industry. 

Cyber threat intelligence also plays a critical role in expanding information and spreading awareness.

Career Opportunity

There are many opportunities for you to start or advance in the field of cybersecurity.

Reliable Cyber Solutions, LLC., has an online institution that offers standardized programs for Certified Ethical Hackers, Certified Network Defenders, and others more. You can check the details of our company, courses, services, and certifications at our website at RCyberSolutions.

error: Content is protected !!
AVOID DARK WEB THREATS
Enter your name and email below and I’ll send you a checklist on how to secure your business systems from the dark web – and notify you when new training and resources are available.