ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Hacking Method Listens to the Noise a Hard Drive Makes

New Hacking Method Listens to the Noise a Hard Drive Makes

As though computing systems apparently weren’t under enough threats, security researchers have discovered yet another potential vulnerability from a truly unexpected source. The sounds your hard drive makes can give a properly-equipped hacker everything they need to gather data from your machine, including any encryption keys you may have in place.

Targeting the hard drive’s actuator, DiskFiltration malware can decipher the sounds that the actuator makes as it writes data to the drive’s platters, assuming the malware is paired with the correct device.

Fortunately, this method does not look to be a promising option for hackers to make use of. For one, the hack will only work if the recording device is within six feet of a system for an extended period of time, as the data rate caps out at 180 bits each minute. Furthermore, this method of hacking is only effective against hard disk drives, as solid state drives make no sounds for DiskFiltration to filter through. Therefore, to avoid falling victim to DiskFiltration, there are some relatively simple precautions to take.

Encourage employees to keep an inventory of their desktops. Since the physical component of DiskFiltration requires a very close range, chances are it can be avoided if a worker just keeps track of the things on their desk, keeping unfamiliar devices away from your system. Make sure your employees remain vigilant of threats, both online and in person.

Consider upgrading to SSD. Without the physical noise of a mechanical hard drive, DiskFiltration is rendered useless. Plus, your systems will receive a boost in stability in general from the moving-part-free hardware.

If you upgrade to an SSD, you are that much better defended against a new variety of threat, as well as given the opportunity to prepare for similar threats before they advance.

To learn more about how to protect your business from the latest hacks, subscribe to ClearView IT’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Artificial Intelligence Managed IT services Gadgets Networking Workplace Strategy Windows Spam Business Technology WiFi Blockchain Bandwidth Encryption Server Mobile Device Management Information Remote App Virtualization Office 365 Budget History Gmail Employee/Employer Relationship Office Apple Two-factor Authentication Information Technology Cybercrime Wi-Fi Conferencing Access Control Data Security Big Data Health BDR Analytics Remote Computing Voice over Internet Protocol Document Management Hacker IT Management Save Money Training Compliance Employer-Employee Relationship Patch Management Help Desk Vendor Cost Management Hacking Remote Monitoring Outlook Legal Password Mobile Office Data storage Money Managed Services Customer Service Unified Threat Management Data loss Firewall Augmented Reality Word BYOD IBM Search... Best Practice Computing Website Vendor Management Hard Drive Retail Applications Alert Project Management Vulnerabilities Hiring/Firing Healthcare Printer Websites Remote Workers Mobility Meetings Windows 7 Chrome Free Resource Google Maps Social Scam Travel Sports DDoS Virtual Reality SaaS How To Social Engineering Cryptocurrency Mobile Computing Black Market VPN iPhone Cleaning Cortana Marketing Education Update Robot Running Cable Content Filtering Router Storage Data Breach Paperless Office Antivirus The Internet of Things Maintenance YouTube Twitter Windows 11 Law Enforcement Monitoring User End of Support Laptop Downloads Computer Care Vulnerability Saving Time Downtime Safety Hack Identity Theft Managed Services Provider Software as a Service Notifications Data Protection Computers Bitcoin Unified Communications Virtual Private Network Virtual Desktop Google Docs Experience Telephone Bluetooth Distributed Denial of Service PowerPoint Current Events Office Tips Administration Private Cloud Memory Excel Solutions Presentation Disaster Specifications IT Consultant Tech Terms Images 101 Integration Display Managed IT Politics Lithium-ion battery Machine Learning Customer Relationship Management Digital Settings Virtual Assistant Co-Managed IT Entertainment Employees Solid State Drive Taxes Avoiding Downtime Processors Holidays Processor Drones Chromebook Cooperation Automobile Video Conferencing Physical Security Virtual Machines How To HIPAA Computer Repair Multi-factor Authentication Wireless Technology Microchip Flexibility Start Menu Professional Services eWaste intranet Business Communications In Internet of Things Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Samsung Device security Managed IT Service Network Congestion Wireless Shortcut Business Owner Management Regulations Compliance Hacks Environment Reliable Computing Uninterrupted Power Supply Wireless Headphones Memes Writing Webcam Microsoft Excel Workplace Heating/Cooling Social Networking Tech Human Resources Business Mangement Going Green Net Neutrality Windows XP Business Cards Tablets Error Financial Data Bookmark Risk Management Scalability IT Scams Google Calendar Term Google Apps Administrator Download Text Messaging Supercomputer Piracy Proactive IT HTML Inbound Marketing Virus Telework Bring Your Own Device Browsers Smartwatch Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Comparison Google Play Google Drive Upload Procurement Software License Music Staffing Social Network FinTech Electronic Payment Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Point of Sale IP Address Television Security Cameras Botnet Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Cabling Devices Cyber security Micrsooft Shortcuts Customer Resource management Organization Rental Service Fileless Malware Phone System Tablet Smart Devices Flash G Suite Tip of the week Mouse VoIP Gamification Remote Working Telephone Systems Tracking Company Culture Business Growth Regulations Trend Micro Recovery Be Proactive Competition Telephone System AI Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Entrepreneur SharePoint Content Banking LiFi Digital Payment Desktop Wasting Time Google Wallet Computer Accessories Worker Accountants eCommerce Deep Learning Documents Modem Workplace Strategies Application Electronic Medical Records Messenger Business Intelligence Videos Access Database Surveillance Time Management Business Metrics Public Cloud Managing Costs Hosted Solution Books Equifax Securty SSID Health IT Audit Media Spyware Tactics Development Language Hard Drive Disposal Employer/Employee Relationships Society Domains Username File Sharing Virtual Machine Reading Startup Optimization Monitors Freedom of Information Smart Technology Visible Light Communication Redundancy Reviews Navigation 2FA Cache Addiction email scam Teamwork Windows 8 Troubleshooting Unified Threat Management Data Storage Workers Mobile Security Hypervisor User Tip Shopping Relocation Legislation Displays News Medical IT Advertising Public Speaking Printing Evernote Paperless Network Management Work/Life Balance Streaming Media CCTV SQL Server Tech Support Licensing Keyboard Touchscreen PCI DSS Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Hard Drives

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?