Smartphones are becoming increasingly popular in schools and workplaces.
As such, they’re also becoming an increasingly common target for hackers and criminals.
The most recent smartphone-related incident to come to light is a hack of the hassrick-based SmartPebble speaker, in which an attacker was able to get access to its built-in microphone, microphone input and speaker output.
Hacking a phone is not a new concept, and a handful of companies have developed their own tools to do so.
The Hacking Team, however, is a company that has developed a way of cracking a smartphone without a phishing attack or a malicious app download.
In its research, the company was able use the Android Open Source Project (AOSP) to remotely control a device via Bluetooth and microphone input.
“Our research shows that, by using the AOSP API, we were able to remotely access a smartphone from the outside world and install a malicious application that made the device respond with the microphone input,” Hackers and scammers were able to hack the hidrick, in addition to the microphone.
The researchers say that the attack could be used to bypass the security features on Android phones, and that they’re currently investigating the possibility of a similar attack on a third-party Android phone.
The attack was first reported by security researchers at Security Research Labs and was quickly shared with the news site Wired.
While there is no evidence yet that a phish attack was used, the Hacking team says that the device was connected to a network that would have enabled the attack.
“Hackers could have easily been able to connect the device and start an unauthorized session, which would have triggered the attack by bypassing the security checks that Google Play recommends for devices with built-ins,” the researchers say.
“Hackers are currently investigating this issue further to determine whether or not there is an appropriate security update available for the hittrick.”
In addition to their research, Hacking also revealed that they had successfully cracked a Samsung Smart TV.
They said that they found a method of bypassing its “feature fingerprinting” and that it could also be used as a backdoor.
But there are some issues with this.
While the device does require the HIDTK software, the device is not running the Hidrick firmware, which means that a hacker would have to hack the HHD to gain access.
Another issue is that the company said that it has not yet cracked the Hattrick-powered speaker, and said that the results could be improved.
On the flipside, the researchers said that there were still a number of ways to bypass this hack, including using the HAT-based Android emulator to access the device.