When Your Headset Becomes A Listening Device
-
Deutsch
de
Wenn das Headset zur Wanze wird
Original
Read more: Wenn das Headset zur Wanze
Français
fr
Quand le casque audio devient un micro espion
Read more: Quand le casque audio devient un micro e
One scenario described in the study illustrates how simple an attack can be: a confidential video conference is under way at an operator of critical infrastructure. The network is secure, the connection encrypted and the laptop protected. But from a nearby car park, an attacker uses an antenna to intercept the unencrypted radio signal from a wireless desk microphone – and listens in.
A 'hidden attack surface'The case is hypothetical, but technically realistic. Many wireless peripheral devices transmit data via radio, sometimes without encryption or with only weak protection.
“These devices represent a hidden attack surface that is often overlooked in daily security routines,” says Tobias Castagna, head of the NTC's testing team.“Yet it is precisely through these devices that sensitive information is exchanged. Passwords are entered on keyboards and confidential conversations take place on headsets.”
More than 60 vulnerabilities identifiedFor the study, the NTC examined around 30 devices, including keyboards, headsets and conference systems. The security analysis uncovered more than 60 vulnerabilities. Of these, 13 were classified as serious and three as critical. The detailed findings were shared confidentially with manufacturers so they could address the weaknesses.
The institute concludes that modern peripheral devices are generally sufficiently secure for everyday use – provided they are regularly updated with the latest firmware.
“Organisations with high security requirements, such as operators of critical infrastructure, as well as exposed individuals like politicians, journalists or lawyers, should be aware of these risks and take appropriate precautions,” says Castagna.
When headsets connect twiceWireless headsets, for example, should not be left unattended. Many models allow pairing with multiple devices simultaneously. While convenient, this feature can also be exploited.
“If an attacker gains brief access, they can add another device and listen in on conversations from that point onward,” Castagna explains.
The study's conclusion: it is not only computers that need protection, but also the devices connected to them. For maximum security, wired accessories remain the safer option.
Join the debate:
External ContentTranslated from French using AI/amva/ts
How we translate with AIWe use automatic translation tools, such as DeepL and Google Translate, for some content.
Each translated article is carefully reviewed by a journalist for accuracy. Using translation tools gives us the time for more in-depth articles.
Learn more here about how we work with AI.
External Content Popular Stories Most DiscussedIn compliance with the JTI standards
More: SWI swissinfo certified by the Journalism Trust Initiati
You can find an overview of ongoing debates with our journalists here. Please join us!
If you want to start a conversation about a topic raised in this article or want to report factual errors, email us at ....
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.

Comments
No comment