Newsletter Content

New Hacking Method Listens to the Noise a Hard Drive Makes

New Hacking Method Listens to the Noise a Hard Drive Makes

As though computing systems apparently weren’t under enough threats, security researchers have discovered yet another potential vulnerability from a truly unexpected source. The sounds your hard drive makes can give a properly-equipped hacker everything they need to gather data from your machine, including any encryption keys you may have in place.

Targeting the hard drive’s actuator, DiskFiltration malware can decipher the sounds that the actuator makes as it writes data to the drive’s platters, assuming the malware is paired with the correct device.

Fortunately, this method does not look to be a promising option for hackers to make use of. For one, the hack will only work if the recording device is within six feet of a system for an extended period of time, as the data rate caps out at 180 bits each minute. Furthermore, this method of hacking is only effective against hard disk drives, as solid state drives make no sounds for DiskFiltration to filter through. Therefore, to avoid falling victim to DiskFiltration, there are some relatively simple precautions to take.

Encourage employees to keep an inventory of their desktops. Since the physical component of DiskFiltration requires a very close range, chances are it can be avoided if a worker just keeps track of the things on their desk, keeping unfamiliar devices away from your system. Make sure your employees remain vigilant of threats, both online and in person.

Consider upgrading to SSD. Without the physical noise of a mechanical hard drive, DiskFiltration is rendered useless. Plus, your systems will receive a boost in stability in general from the moving-part-free hardware.

If you upgrade to an SSD, you are that much better defended against a new variety of threat, as well as given the opportunity to prepare for similar threats before they advance.

To learn more about how to protect your business from the latest hacks, subscribe to White Mountain IT Services’s blog.

Related Articles

  • Tip of the Week: How to Spot a Scam What would you do if you sat down at your desk one morning, coffee still kicking in, to discover a pop-up message on your computer announcing that Microsoft has detected a fatal issue with your workstation, and if they aren’t allowed to remote in and fix it, the entire network could be at risk? Woul...
  • Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...
  • Tip of the Week: Awareness Is Important When Surfing the Web We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing. Sacrificing Security for ConvenienceFor starters, most of the threats to be found online are of the sort that can be avoided somewha...
  • Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
  • Here’s How Companies Struggle with IT Security No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security. Password...
  • Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions