Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Forget Reading Data, These Ingenious Hackers Listen to Data

Forget Reading Data, These Ingenious Hackers Listen to Data

Computing systems are always vulnerable to some obscure hack or another, and researchers are always trying to find ways to shore them up and prevent future attacks. One previously undiscovered hack literally sounds far-fetched. It uses the sounds that your hard drive makes to help a hacker steal data from your machine, including encryption keys designed to keep your data safe and secure.

The threat in question targets the hard drive’s actuator. DiskFiltration looks at the sounds emitted by the actuator as it writes data to the drive’s platters. Granted, the malware needs to be paired with the correct device, which makes the malware a bit trickier to exploit than it sounds.

You can take a deep breath and relax, as this method doesn’t look like it will be an effective attack medium for hackers. DiskFiltration will only work if the recording device is very close (within six feet) of the system. What’s more is that it needs to be near it for an extended period of time. The data rate caps out at 180 bits each minute, so the longer the device has to be sitting around, the higher the chances of someone finding the device and foiling the plan. Another huge problem for DiskFiltration is that it only works with hard disk drives. Solid state drives don’t make sounds that the malware can filter through, and besides, SSDs are better than hard disk storage anyway.

If you’re worried about DiskFiltration, here are two ways that you can keep silent about your data.

Encourage Employees to keep Inventory of their Desktops
The physical part of DiskFiltration needs to be very close, so it’s possible that your employees might spot something out of place on their desk. Ask them to stay vigilant when it comes to their workspace, as there are plenty of other threats out there that utilize unfamiliar devices (like USB drives). Educate them on the fact that threats come not just from the Internet, but from other hardware as well.

Upgrade Your Hardware to Solid State Drives
Since SSDs don’t make much noise, DiskFiltration becomes pointless. In general, SSD can improve the way that your business functions, as it’s more stable than the hardware used within a hard disk drive. You can’t go wrong with SSD, as it will help your business in the long run and keep developing threats like DiskFiltration at bay.

To learn more about the latest threats and how to combat them, subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Email Workplace Tips Google Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Managed Service Ransomware AI Users Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Facebook Artificial Intelligence Cloud Computing Covid-19 Training Compliance Gadgets Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Business Continuity Government Vendor Wi-Fi Business Technology Windows 10 Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Managed Services Data Security Apps BYOD App Tip of the week Mobile Device Management Voice over Internet Protocol Gmail Chrome WiFi Networking Budget Employer-Employee Relationship Apple HIPAA Physical Security Applications Hacker Avoiding Downtime Access Control Computing Marketing Information Technology Conferencing Office 365 Managed IT Services How To BDR Password Router Computers Virtual Private Network Operating System Health 2FA Website Help Desk Risk Management Retail Healthcare Office Tips Analytics Augmented Reality Big Data Storage Bring Your Own Device Vendor Management Solutions Customer Service Going Green Display Printer Paperless Office Windows 11 Cybercrime Infrastructure Monitoring Excel Document Management Firewall Managed IT Service Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability IT Management Meetings VPN Employees Hacking Integration Presentation Modem User Tip Processor Settings Computer Repair Mobile Security Printing Wireless Technology Wireless Holidays Content Filtering YouTube Data Storage Smart Technology Supply Chain Cryptocurrency Video Conferencing Word Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Virtual Desktop Data storage LiFi Maintenance Downloads Antivirus iPhone Outlook Safety Licensing Money Vulnerabilities Humor Entertainment Data Privacy Images 101 Sports Multi-Factor Authentication Robot Mobility Mouse Telephone System Cost Management Customer Relationship Management Administration Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Best Practice Competition Buisness Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Legal IT solutions User Error Microchip Internet Exlporer Software as a Service Fraud Meta Business Growth Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID User Cortana Database Surveillance Virtual Assistant Outsource IT Alt Codes Media Downtime Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT IP Address Hosted Solution Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Typing Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Google Drive Recovery Shopping Knowledge Hard Drives SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Domains Management PCI DSS 5G Chatbots Experience Screen Reader Writing Distributed Denial of Service Workplace Google Docs Unified Communications Lenovo Gig Economy Bitcoin Refrigeration Running Cable Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Google Wallet Public Speaking Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Lithium-ion battery Superfish Bookmark Windows 8 Laptop Entrepreneur Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Drones Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Undo Halloween Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables CES Hacks Scary Stories Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Fun File Sharing Regulations Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Deep Learning Application Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts IBM Education Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Mobile Computing Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Search

Blog Archive