Slowburn
If there is a way for the computers to communicate some jackwad will use it to do damage.
Onihikage
*sigh* Yet another tech news site publishing an article on this stupid crap. The researchers made an acoustic network, then demonstrated that it could transmit and receive malware. Of f██ing course an acoustic network is vulnerable to malware - ALL networks are. That's why we have antivirus software and firewalls!
felix
But the malware has to already be installed on both the sender and the receiver, so its not like your computer can be infected while not connected the the internet.
ivan4
So here we have what is essentially an acoustic modem. I remember using those as a simple network for two computers in the 80s.
The other thing to consider is the fact that most industrial computers do not have microphones attached nor sound cards installed. Which begs the question, how will this work to spread malware over the air gap in industry?
As it stands this is just children without experience in industry playing with laptop computers.
Catweazle
So what's new?
Way back in the early 1980s I had Sinclair Spectrums communicating in Morse code via their speakers and cassette ports.
Sharky67
Please stop repeating this story with a slant toward "The End Is Nigh". As remarkable as the tech is, it is far cry from the suggestion an impending day of Malware dominance is closer than we think. It should also be noted it's almost untruthful to plant the notion that powered-off PC's everywhere could potentially be exposed.
Fact: This was an orchestrated test based on a theory, a theory that was only discovered by sheer fluke over 6mths ago. That discovery took place in a protected and controlled environment. This latest "proof" was also gained from a controlled environment.
Fact: A powered-off PC cannot receive anything ..... unless it's already infected and has been commandeered to do so.
Fact: The original discovery of this phenomena was believed to be related to a malware transmission via a USB stick. One does not simply tel-net into Mordor, nor does one simply gain control of a powered-off PC. It takes a fair bit of tech in both cases. And even then once the PC is infected it can only jump the "air-gap" provided there's something close enough. Hardly capable of taking down the masses.
Fact: There are much more prevalent malware and trojan threats delivered in much more efficient ways, might I suggest delivery via this method is far too time consuming to code and execute.
Please return to your regular quality of journalism and refrain from fanning the flames of paranoia. This story is a pre-designed framework of hypothesis and theory, who's lab-test results appear to be taking on the form of the next great viral internet sensation.
nutcase
"When I click my fingers you will wake up feeling refreshed and happy" Computers hypnotizing computers. Who would've thought?
MQ
AS with those preaching moderation on the scary front.
Just because a computer may have an active microphone and speakers, does not mean that these can be used for any kind of network communication. The software (and possibly hardware for a more efficient system) must be installed in order for the inputs at the microphone to allow the computer to perform any other action than to relay, or record the audio. As some commenters above mention, sure this network software could be installed as a form of malware and so could any virus, trojan or other bot. More likely is, that if this is seen as a replacement for low baud rate local area blue-tooth type connectivity, it may be a feature in future systems, or you may download it as an app for current devices.
Of course it could be misused, just as a bluetooth or wi-fi enabled device can be used as a bridge between unconnected computers and computers with an internet gateway, given the correct connectivity setings and software. (note or even create an ad-hoc network without internet connectivity)
There are wifi sniffers which can break through (some) wifi security measures, so should we all fear using wifi.
If someone with true intent wants to hack your system, they will do it. Internet security starts with not allowing others access to passwords and encryption keys, be smart and stay safe...
(As an aside: Probably the easiest way (def. not legal) to hack a system starts with installing clandestine audio and video recording devices in the vicinity of PC/laptop/etc, hell just comprehensively bug their premises, wouldn't that freak you out. Observe their habits and security measures first hand, then crack their system.)
Technology changes we all must adapt.
Thierry Phillips
One thing most are ignoring is the level of voice control currently implemented, which is apt to expend greatly (probably exponentially). I think the future threat is much more substantial than most are willing to recognize, also given the defacto standard for IoT devices already is 64-bit if not multi-core. Ivan4's point about industrial deployment is becoming moot as so much is embedded, it becomes a substantial chore to disable very useful hardware components due to their vulnerability. It will probably be necessary going on, unless effective security gets embedded as well, and I don't see that much happening yet, so it's at least in the next replace/reequip cycle.
Kris Lee
That you do not understand the implications of this demonstration, does not make it less significant.
It shows that it is very hard to isolate one computer from the network when any possible hardware for modulation is available.
You claim that it is not practical? You should think harder and more out of your daily bubble.
For example what about journalists handling sensitive information using isolated laptop that is never connected to the network?