Close Menu
Alpha Leaders
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
What's On
Howard Marks was skeptical about AI. What it said to him about Buffett and Munger left him shook

Howard Marks was skeptical about AI. What it said to him about Buffett and Munger left him shook

3 March 2026
This 10-year-old in California taught herself to read—now she’s just enrolled in a college class while still in elementary school

This 10-year-old in California taught herself to read—now she’s just enrolled in a college class while still in elementary school

3 March 2026
Venture capitalist Bill Gurley warns workers who went through the ‘college conveyor belt’ and chased safe jobs that they’ll feel AI’s disruption first

Venture capitalist Bill Gurley warns workers who went through the ‘college conveyor belt’ and chased safe jobs that they’ll feel AI’s disruption first

3 March 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Alpha Leaders
newsletter
  • Home
  • News
  • Leadership
  • Entrepreneurs
  • Business
  • Living
  • Innovation
  • More
    • Money & Finance
    • Web Stories
    • Global
    • Press Release
Alpha Leaders
Home » How Hackers Use A Smartwatch To Steal Highly Confidential Data
Innovation

How Hackers Use A Smartwatch To Steal Highly Confidential Data

Press RoomBy Press Room13 June 20253 Mins Read
Facebook Twitter Copy Link Pinterest LinkedIn Tumblr Email WhatsApp
How Hackers Use A Smartwatch To Steal Highly Confidential Data

There are a myriad ways that a hacker can steal your data and compromise your systems, from automatic hacking machines, from automatic hacking machines, using your contacts as unwitting accomplices, and even analyzing PIN code usage, to name but three. But what if an attacker could steal highly confidential, top secret data from even an air-gapped network that is not connected to the internet, using a smartwatch? Security researchers at Ben-Gurion University of the Negev have demonstrated how they can do just that. Here’s what you need to know about SmartAttack.

SmartAttack Can Exfiltrate Sensitive Data From Air-Gapped Networks Using A Smartwatch

Let’s get the prerequisite disclaimer out of the way first, shall we? This article is based on security research of the bleeding-edge variety. As such, it examines improbable scenarios that, if exploited, could have devastating consequences for governments and corporations alike. Just because something is unlikely to occur does not mean it will not or can not. Because the attack vector involved is that of air-gapped computers, the ones that contain the most highly sensitive of all data, hence the need to separate them from all external networks, that risk, however small, must never be discounted.

Here’s the truth of the matter: air-gapped systems can and have been compromised by everything from malicious insiders and contractors with infected USB thumb drives to highly sophisticated supply chain attacks involving state-sponsored campaigns, as observed in the past. This is important because it shows that this type of installation is not impenetrable. However, being able to attack such a system with malicious, system-harmful intent is quite different from eavesdropping, which, by necessity, requires the attacker to exfiltrate data from the environment. Because of the physical isolation from external systems, hackers will look to use other methods to exfiltrate data. Methods such as ultrasonic communication using smartphones as a covert communication channel. Hence, smartphones are not generally allowed within the vicinity of such air-gapped systems. But what if a smartwatch could be used instead?

This is where Mordechai Guri, head of the Offensive Cyber Research Lab at the Ben-Gurion University of the Negev, Israel, steps in with his SmartAttack research.

Air-Gap Jumping Using A Smartwatch

This is where Mordechai Guri, head of the Offensive Cyber Research Lab at the Ben-Gurion University of the Negev, Israel, steps in with his SmartAttack research. Guri is one of the leading authorities when it comes to what you might call, and he does, in fact, call air-gap jumping research. “Our approach utilizes the built-in microphones of smartwatches to capture covert signals in real time within the ultrasonic frequency range of 18–22 kHz,” Guri explained. The findings, Guri warned, “highlight the security risks posed by smartwatches in high-security environments.”

I highly recommend reading the complete research for the full technical details regarding SmartAttack, but the TL;DR can be summed up as an already compromised system can have data successfully exfiltrated using a sound-monitoring app on a smartwatch that receives inaudible to human frequencies from malware installed on the target computer. It doesn’t even have to be the hacker’s smartwatch, as any compromised employee’s watch could perform the same trick. “The smartwatch then forwards the extracted data to the attacker using available communication channels such as Wi-Fi, cellular networks, or Bluetooth tethering,” Guri said, “effectively bypassing traditional security measures.”

Guri suggested that “restricting or prohibiting the use of smartwatches and similar audio-capable wearables in sensitive environments is a direct mitigation strategy.”

air-gapped Ben-Gurion University of the Negev confidential data hack eavesdropping security research SmartAttack smartwatch attack smartwatch hack smartwatch steals sensitive data spying
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link

Related Articles

When Claude Paused: An AI Doomsday Preview And The Question Of Human Survival

3 March 2026

Data Plateau: Hit The Scaling Wall With AI Or Remain An Innovator?

3 March 2026
New Leak Signals Unprecedented Design Change

New Leak Signals Unprecedented Design Change

1 March 2026
Is Tourism A Tool Or A Threat?

Is Tourism A Tool Or A Threat?

1 March 2026
Trust In The AI Age

Trust In The AI Age

1 March 2026
LEGO Pikachu And Poke Ball (72152) Review: Lacking A Spark

LEGO Pikachu And Poke Ball (72152) Review: Lacking A Spark

1 March 2026
Don't Miss
Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

Unwrap Christmas Sustainably: How To Handle Gifts You Don’t Want

By Press Room27 December 2024

Every year, millions of people unwrap Christmas gifts that they do not love, need, or…

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

Walmart dominated, while Target spiraled: the winners and losers of retail in 2024

30 December 2024
Moltbook is the talk of Silicon Valley. But the furor is eerily reminiscent of a 2017 Facebook research experiment

Moltbook is the talk of Silicon Valley. But the furor is eerily reminiscent of a 2017 Facebook research experiment

6 February 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Latest Articles
Exclusive: CrowdStrike and SentinelOne veterans raise M to tackle enterprise AI’s governance gap

Exclusive: CrowdStrike and SentinelOne veterans raise $34M to tackle enterprise AI’s governance gap

3 March 20260 Views
Pizzagate and UFOs among questions Republicans have for Clintons over Epstein

Pizzagate and UFOs among questions Republicans have for Clintons over Epstein

3 March 20260 Views
The Iran war could accelerate the rise of the ‘poly-national’ company

The Iran war could accelerate the rise of the ‘poly-national’ company

3 March 20261 Views
Want to live forever? Meta patented an AI model that would keep your profile active after you die

Want to live forever? Meta patented an AI model that would keep your profile active after you die

3 March 20261 Views
About Us
About Us

Alpha Leaders is your one-stop website for the latest Entrepreneurs and Leaders news and updates, follow us now to get the news that matters to you.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks
Howard Marks was skeptical about AI. What it said to him about Buffett and Munger left him shook

Howard Marks was skeptical about AI. What it said to him about Buffett and Munger left him shook

3 March 2026
This 10-year-old in California taught herself to read—now she’s just enrolled in a college class while still in elementary school

This 10-year-old in California taught herself to read—now she’s just enrolled in a college class while still in elementary school

3 March 2026
Venture capitalist Bill Gurley warns workers who went through the ‘college conveyor belt’ and chased safe jobs that they’ll feel AI’s disruption first

Venture capitalist Bill Gurley warns workers who went through the ‘college conveyor belt’ and chased safe jobs that they’ll feel AI’s disruption first

3 March 2026
Most Popular
Goldman finds no relationship between AI and productivity but a 30% boost for 2 specific use cases

Goldman finds no relationship between AI and productivity but a 30% boost for 2 specific use cases

3 March 20261 Views
Exclusive: CrowdStrike and SentinelOne veterans raise M to tackle enterprise AI’s governance gap

Exclusive: CrowdStrike and SentinelOne veterans raise $34M to tackle enterprise AI’s governance gap

3 March 20260 Views
Pizzagate and UFOs among questions Republicans have for Clintons over Epstein

Pizzagate and UFOs among questions Republicans have for Clintons over Epstein

3 March 20260 Views
© 2026 Alpha Leaders. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.