Skip to main content

Hackers can now even use your PC’s HDMI cable to steal data

A side profile view of the MacBook Pro's port selection.
Luke Larsen / Digital Trends

Researchers at the University of the Republic of Uruguay discovered that hackers can use AI to spy on a user’s display by snatching leaked electromagnetic radiation from a PC’s HDMI cable using a new technique, according to New Scientist.

Hackers can use different methods for the attacks, such as placing an antenna outside a building to intercept the signals from the HDMI cable. When they intercept the data, hackers can then use additional steps to access users’ sensitive data, such as personal banking information or encrypted messages. Federico Larroca and his team at the university have created an AI model that can rebuild signals from the leaked signals even from multiple meters away.

The researchers prepared an AI model to identify patterns when comparing the original and intercepted signals. The research teams discovered that only 30% of the characters were misread. The team labeled the error rate low; therefore, hackers could still read most of the text. The research team’s method was 70% more accurate than the preceding state-of-the-art attacks.

The attacks mostly occur in government or industrial settings. Therefore, these types of buildings are already taking the necessary precautions to keep their signals safe.

“Governments are worried about this, but I wouldn’t say that the normal users should be too concerned,” Larroca said. “But if you really care about your security, whatever your reasons are, this could be a problem.”

When everything was analog, this would have been even easier for hackers to pull off, rebuilding what was on a user’s screen using leakage from video cables. However, HDMI made the transmission of data more complex, but it was not impossible for hackers to gain access to sensitive data using AI. So, there is no need to throw away your HDMI cable just yet.

Judy Sanhz
Judy Sanhz is a Digital Trends computing writer covering all computing news. Loves all operating systems and devices.
Hackers are pretending to be cybersecurity firm to lock your entire PC
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

As hackers come up with new ways to attack, not even trustworthy names can be taken at face value. This time, a ransom-as-a-service (RaaS) attack is being used to impersonate a cybersecurity vendor called Sophos.

The RaaS, referred to as SophosEncrypt, can take hold of your files -- or even your whole PC -- and requires payment to have them decrypted.

Read more
Hackers are using a devious new trick to infect your devices
A person using a laptop with a set of code seen on the display.

Hackers have long used lookalike domain names to trick people into visiting malicious websites, but now the threat posed by this tactic could be about to ramp up significantly. That’s because two new domain name extensions have been approved which could lead to an epidemic of phishing attempts.

The two new top-level domains (TLDs) that are causing such consternation are the .zip and .mov extensions. They’ve just been introduced by Google alongside the .dad, .esq, .prof, .phd, .nexus, .foo names.

Read more
This Mac malware can steal your credit card data in seconds
Apple's Craig Federighi speaking about macOS security at WWDC 2022.

Despite their reputation for security, Macs can still get viruses, and that’s just been proven by a malicious new Mac malware that can steal your credit card info and send it back to the attacker, ready to be exploited. It’s a reminder to be careful when opening apps from unknown sources.

The malware, dubbed MacStealer, was discovered by Uptycs, a threat research firm. It hoovers up a wide array of your personal data, including the iCloud Keychain password database, credit card data, cryptocurrency wallet credentials, browser cookies, documents, and more. That means there’s a lot that could be at risk if it gains a foothold on your Mac.

Read more