From brightness adjustment to privacy invasion<\/strong><\/h2>\nAmbient light sensors are commonplace in smartphones, primarily used to adjust screen brightness according to environmental lighting. However, CSAIL researchers<\/u> have demonstrated that these sensors could potentially be repurposed to capture images of a user\u2019s surroundings.<\/p>\n
By employing a computational imaging algorithm, they managed to recover environmental images from the perspective of the phone\u2019s screen, utilizing only the light intensity data from these sensors.<\/p>\n
CLICK TO GET KURT\u2019S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO\u2019S TO MAKE YOU SMARTER<\/u><\/strong><\/p>\n\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
Two people looking at their iPhones\u00a0<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nA comprehensive privacy threat<\/strong><\/h2>\nThe implications of this discovery are far-reaching.\u00a0<\/p>\n
“Ambient light sensors are tiny devices deployed in almost all portable devices and screens that surround us in our daily lives,” notes Princeton University professor Felix Heide. The study underscores a privacy threat that spans a broad spectrum of devices, previously underestimated in its potential impact.<\/p>\n
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?<\/strong><\/p>\n\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
A person on a cell phone\u00a0<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nGesture interception and interaction capture<\/strong><\/h2>\nBeyond static images, the study suggests that ambient light sensors could intercept user gestures, like swiping and sliding, capturing interactions with phones during activities such as video watching. This capability challenges the belief that ambient light sensors are harmless in terms of private data exposure.<\/p>\n
\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
An iPhone<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nMORE: BEST WAY TO PROTECT YOUR DEVICES FROM GETTING HACKED<\/u><\/strong><\/p>\nThe call for tighter permissions<\/strong><\/h2>\nYang Liu, a Ph.D. candidate at MIT EECS and CSAIL, warns that ambient light sensors, in conjunction with display screens, can capture our actions without consent, posing significant privacy risks. The researchers urge operating system developers to tighten permissions for these sensors, reducing their precision and sampling rate.<\/p>\n
\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
Person on an iPhone<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nLooking ahead: Designing for privacy<\/strong><\/h2>\nTo mitigate these security concerns, the study proposes granting users control over ambient light sensor permissions akin to camera permissions. Additionally, future device designs might include ambient light sensors positioned away from the user, such as on the side of the device, to prevent unauthorized visual data capture.<\/p>\n
While the study\u2019s findings prompt a reevaluation of sensor permissions and design, it\u2019s equally important to recognize the broader context of smartphone security vulnerabilities. Let\u2019s delve into the realm of spyware, another pressing concern where even the most vigilant users can find themselves compromised.<\/p>\n
\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
A woman talking on her cell phone<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nUnderstanding spyware vulnerability on your smartphone<\/strong><\/h2>\nYou might not realize it, but your phone could be more exposed to spyware than you think. Just a small slip-up while you\u2019re browsing the web, and you could accidentally invite a cyber-spy into your life. If you\u2019re an Android user, be extra cautious. Your phone is usually more at risk than iPhones.<\/p>\n
But here\u2019s the kicker. Even if you\u2019re super careful, you\u2019re not totally out of the woods. If you don\u2019t update your phone\u2019s software regularly<\/u> or if you\u2019ve jailbroken it, you\u2019re playing with fire. Here are some telltale signs of spyware on your phone.<\/p>\n\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
A woman on her smartphone<\/span> (Kurt “CyberGuy” Knutsson))<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nMORE: SNEAKY SPYWARE IS AFTER YOUR MOST SENSITIVE DATA\u00a0<\/u><\/strong><\/p>\nThe telltale sign of spyware on your phone<\/strong><\/h2>\nIs your phone acting strange? Here are the telltale signs of spyware on your device.<\/p>\n
Unusual noises:<\/strong> Beeping, faint voices or static during calls might not just be network issues. They could signal an eavesdropping attempt.<\/p>\nPerformance lags:<\/strong> If your phone suddenly slows down or the battery drains rapidly, spyware might be hogging your resources.<\/p>\nSensors activate unexpectedly:<\/strong> Modern smartphones signal when cameras and mics are in use. If this happens sans your input, investigate promptly.<\/p>\nMysterious apps and files:<\/strong> New, unrecognizable apps or files might indicate that your phone’s security has been breached.<\/p>\nExcessive pop-ups and spam:<\/strong> An uptick in ads, error messages or scam texts may be adware, a common companion to spyware.<\/p>\nOverheating issues<\/strong>: Like performance lags, overheating can suggest that spyware is overworking your phone’s internals.<\/p>\n\n
<\/source><\/source><\/source><\/source><\/picture><\/div>\n\n
\n
Smartphone on the seat of a vehicle\u00a0<\/span> (Kurt “CyberGuy” Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\nMORE: MALICIOUS ANDROID SPYWARE DETECTED IN OVER 100 POPULAR APPS\u00a0<\/u><\/strong><\/p>\nSeveral steps you can take to protect yourself from spyware on your smartphone<\/strong><\/h2>\n1. Have good antivirus software:<\/strong> Yes, antivirus protection can help detect and disable spyware on your smartphone. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices<\/u>.<\/p>\n 2. Remove unfamiliar apps and files: <\/strong>If you suspect your phone has been hacked, promptly remove any unfamiliar apps<\/u>.<\/p>\n 3. Restart your device: <\/strong>Rebooting your phone can sometimes stop spyware from running.<\/p>\n4. Update to the latest software: <\/strong>As mentioned before, updates can patch vulnerabilities.<\/p>\n5. Be cautious when browsing:<\/strong> Avoid clicking on suspicious links or downloading files from untrusted sources.<\/p>\n6. Update your phone regularly: <\/strong>Updates often include security patches that can help protect your device from spyware and other vulnerabilities.<\/p>\n7. Don’t jailbreak your phone:<\/strong> Jailbreaking removes security restrictions that can make your phone more susceptible to spyware.<\/p>\n8. Look for unusual activity:<\/strong> This includes unusual noises during calls, performance lags, unexpected sensor activation, mysterious apps or files, excessive pop-ups and overheating.<\/p>\n9. Delete unwanted or unused apps:<\/strong> Some apps use your device\u2019s camera and microphone and collect your data even while it is not in use. Getting rid of unused apps frees up storage space on your phone and declutters your lock screen. It can also eliminate one more potential app that might be collecting information from you unknowingly.<\/p>\nOn an iPhone:<\/strong><\/p>\n\nHard press the app icon of the app you want to delete<\/li>\n Select Remove App<\/strong><\/li>\nYou\u2019ll be prompted to confirm your decision in the next window by tapping Delete App<\/strong><\/li>\nThen again by tapping Delete\u00a0<\/strong><\/li>\n<\/ul>\n\u2028On an Android:<\/strong><\/p>\n\nGo to the Google Play Store app<\/li>\n At the top right, tap the Profile icon<\/li>\n Select Manage apps & devices, click Manage<\/strong><\/li>\nSelect name of the app you want to delete<\/li>\n Select Uninstall<\/strong><\/li>\n<\/ul>\nAndroid settings may vary based on the manufacturer’s settings.\u00a0<\/i><\/p>\n
GET FOX BUSINESS ON THE GO BY CLICKING HERE<\/strong><\/p>\nWhile it may seem like an extra effort to review and change your apps\u2019 permission settings, it\u2019ll give you more peace of mind knowing which apps have access to specific device functions and data. Most devices now have a dedicated part of their settings to view which apps are using the different functions of your phone and what data it has access to.<\/p>\n
10. Changing camera settings:<\/strong> It may seem simple to just give access to your camera to certain apps. This way, you can easily use the camera function whenever you pull up the app to use. There are, however, apps that do not need access to your camera to function. Does your navigation app need access to your camera even when it is not in use? Take back control of your camera by using the steps below to find out which apps have access to your camera and turn it on or off.<\/p>\nOn an iPhone:<\/strong><\/p>\n\nGo to Settings<\/strong><\/li>\nScroll down and select Privacy<\/strong> or Privacy & Security<\/strong><\/li>\nSelect Camera<\/strong><\/li>\nYou can see which apps have access to your camera. Of course, you can leave the apps where it makes sense to have access to your camera toggle on. For apps that do not, you can toggle access off (it will be grayed out)<\/li>\n<\/ul>\nOn an Android:<\/strong><\/p>\nAndroid settings may vary based on the manufacturer’s settings.\u00a0<\/i><\/p>\n\nOpen Settings<\/strong><\/li>\nSelect Apps<\/strong><\/li>\nSelect the app you want to change (If you can’t find it, select ‘See all apps’)<\/li>\n Select Permissions<\/strong> to view if you allowed or denied any permissions for the app<\/li>\nTo change a permission setting, select it, then choose Allow only while using the app<\/strong>, Ask everytime<\/strong> or Don’t allow<\/strong><\/li>\n<\/ul>\n11. Restrict camera and microphone permissions:<\/strong> Restricting camera and microphone permissions<\/u> can make it more difficult for spyware to access these features.<\/p>\n On an iPhone:<\/strong><\/p>\n\nGo to Settings<\/strong><\/li>\nScroll down and select Privacy<\/strong> or Privacy & Security<\/strong><\/li>\nSelect Microphone<\/strong><\/li>\nYou can see which apps have access to your microphone. Of course, you can leave the apps where it makes sense to have access to your microphone toggle on. For apps that do not, you can toggle access off (it will be grayed out)<\/li>\n<\/ul>\nOn an Android:<\/strong><\/p>\nAndroid settings may vary based on the manufacturer’s settings.\u00a0<\/i><\/p>\n\nOpen Settings<\/strong><\/li>\nSelect Apps<\/strong><\/li>\nSelect the app you want to change (If you can’t find it, select ‘See all apps’)<\/li>\n Select Permissions<\/strong> to view if you allowed or denied any permissions for the app<\/li>\nTo change a permission setting, select it, then choose Allow only while using the app<\/strong>, Ask everytime<\/strong> or Don’t allow<\/strong><\/li>\n<\/ul>\nMORE: NEWLY IPHONE SPYWARE TOOL SOLD TO GOVERNMENTS FOR TARGETED SURVEILLANCE<\/u><\/strong><\/p>\nKurt’s key takeaways<\/strong><\/h2>\nIn a world where our smartphones are virtual extensions of ourselves, the discoveries at MIT’s CSAIL cast a new light on what we often take for granted. As we navigate the delicate balance between convenience and privacy, it’s clear that the devices we depend on daily harbor capabilities far beyond their intended use, prompting a necessary conversation on security, awareness and the evolving landscape of digital privacy.<\/p>\n
CLICK HERE TO GET THE FOX NEWS APP<\/strong><\/p>\nWith the revelation that devices we use daily, like smartphones, can be exploited in ways that compromise our privacy \u2014 such as converting ambient light sensors into makeshift cameras \u2014 what steps do you believe technology companies and governments should take to protect personal privacy? Let us know by writing us at <\/strong>Cyberguy.com\/Contact<\/u><\/strong><\/p>\n For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com\/Newsletter<\/u><\/strong><\/p>\n Ask Kurt a question or let us know what stories you’d like us to cover<\/u><\/p>\n
Answers to the most asked CyberGuy questions:<\/p>\n
Copyright 2024 CyberGuy.com.\u00a0 All rights reserved.<\/p>\n
<\/p>\n
\n
\n
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt\u2019s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.<\/p>\n<\/div>\n<\/div>\n<\/div>\n[ad_2]\n","protected":false},"excerpt":{"rendered":"
[ad_1] Researchers at MIT\u2019s Computer Science and Artificial Intelligence Laboratory (CSAIL) recently revealed a startling new privacy threat. Our smartphones\u2019 ambient light sensors might be turned into makeshift cameras. A woman on her iPhone\u00a0 (Kurt “CyberGuy” Knutsson) From brightness adjustment to privacy invasion Ambient light sensors are commonplace in smartphones, primarily used to adjust screen …<\/p>\n","protected":false},"author":1,"featured_media":36061,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/posts\/36059"}],"collection":[{"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/comments?post=36059"}],"version-history":[{"count":0,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/posts\/36059\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/media\/36061"}],"wp:attachment":[{"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/media?parent=36059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/categories?post=36059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/farratanews.online\/wp-json\/wp\/v2\/tags?post=36059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}