{"id":11163,"date":"2026-01-26T07:00:40","date_gmt":"2026-01-26T07:00:40","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=11163"},"modified":"2026-01-26T07:00:40","modified_gmt":"2026-01-26T07:00:40","slug":"audio-accent-flaw-converts-headphones-into-spy-software","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=11163","title":{"rendered":"Audio Accent Flaw Converts Headphones Into Spy Software"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"generic-article\">\n<p class=\"text-muted\">\n                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/endpoint-security-c-506\" id=\"asset_topic_1_1\">Endpoint Safety<\/a><br \/>\n                                                    ,<br \/>\n                                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/internet-things-security-c-465\" id=\"asset_topic_1_2\">Web of Issues Safety<\/a>\n                                                    <\/p>\n<p>                    <span class=\"article-sub-title\">&#8216;WhisperPair&#8217; Flaw More likely to Endure for Years<\/span><br \/>\n                <span class=\"article-byline\"><br \/>\n                                                <a rel=\"nofollow\" target=\"_blank\" class=\"author-link\" href=\"https:\/\/www.bankinfosecurity.com\/authors\/greg-sirico-i-7198\">Greg Sirico<\/a>                                                     \u2022<br \/>\n                        <span class=\"text-nowrap\">January 23, 2026<\/span> \u00a0 \u00a0 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/audio-accessory-flaw-converts-headphones-into-spy-tool-a-30595#disqus_thread\"\/><\/span><\/p>\n<figure>\n                <img decoding=\"async\" src=\"https:\/\/ismg-cdn.nyc3.cdn.digitaloceanspaces.com\/articles\/audio-accessory-flaw-converts-headphones-into-spy-tool-image_large-7-a-30595.jpg\" alt=\"Audio Accessory Flaw Converts Headphones Into Spy Tool\" class=\"img-responsive \"\/><figcaption>Picture: Melnikov Dmitriy\/Shutterstock<\/figcaption><\/figure>\n<p>A hacker may secretly document cellphone conversations, monitor customers&#8217; places and blast music by headphones because of a flaw in implementations of a Google-developed low-energy expertise for locating close by Bluetooth units.<\/p>\n<p><b>See Additionally:<\/b> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/iot-cloud-systems-face-escalating-cyber-risks-amid-global-instability-a-28643?rf=RAM_SeeAlso\">IoT and Cloud Programs Face Escalating Cyber Dangers Amid World Instability<\/a><\/p>\n<p>Researchers on the Belgium\u2019s KU Leuven College Laptop Safety and Industrial Cryptography group <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/whisperpair.eu\/\" target=\"_blank\">disclosed<\/a> this month {that a} sensible machine system referred to as Quick Pair can permits attackers to forcibly pair a wi-fi accent resembling headphones or earbuds with an attacker-controlled machine.<\/p>\n<p>The staff behind the disclosure dubbed the vulnerability &#8220;WhisperPair.&#8221; The flaw, tracked as <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-36911\" target=\"_blank\">CVE-2025-36911<\/a>, lies in what number of accent producers implement Quick Pair. Particularly, researchers mentioned, they permit units to pair with equipment even when the accent just isn&#8217;t in pairing mode.<\/p>\n<p>A WhisperPair assault &#8220;succeeds inside seconds (a median of 10 seconds) at practical ranges (examined as much as 14 meters) and doesn&#8217;t require bodily entry to the susceptible machine,&#8221; researchers mentioned.<\/p>\n<p>Susceptible units <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/whisperpair.eu\/vulnerable-devices\" target=\"_blank\">embody<\/a> audio equipment made by Sony, Jabra, Soundcore, Logitech and likewise Google. Updating a tool&#8217;s working system &#8211; together with iOS &#8211; is not going to essentially shield customers in opposition to the vulnerability, because the flaw is within the accent, researchers mentioned. &#8220;The one option to stop WhisperPair assaults is to put in a software program patch issued by the producer,&#8221; they wrote.<\/p>\n<p>As soon as a malicious machine pairs with a tool, attackers may manipulate the sound settings or flip the microphone on. &#8220;You\u2019re strolling down the road together with your headphones on, you are listening to some music. In lower than 15 seconds, we will hijack your machine,\u201d KU Leuven researcher Sayon Duttagupta <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.wired.com\/story\/google-fast-pair-bluetooth-audio-accessories-vulnerability-patches\/\" target=\"_blank\">advised<\/a> Wired. &#8220;Which signifies that I can activate the microphone and take heed to your ambient sound. I can inject audio. I can monitor your location.&#8221;<\/p>\n<p>Product reviewers at The New York Occasions <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.nytimes.com\/wirecutter\/reviews\/bluetooth-earbuds-hacking-threat\/ \" target=\"_blank\">concluded<\/a> that hackers seemingly would not seize a lot audio past a sufferer&#8217;s fast cellphone dialog. As soon as headphones are off-ear &#8220;it is unlikely that stray headphones may decide up your personal voice, not to mention a close-by dialog,&#8221; the Occasions reported.<\/p>\n<p>Location monitoring is a perform of equipment appropriate with Google\u2019s machine geolocation monitoring characteristic, Discover Hub. An attacker may pair an adjunct not beforehand paired with an Android machine, changing it right into a monitoring machine. &#8220;The sufferer may even see an undesirable monitoring notification after a number of hours or days, however this notification will present their very own machine. This may increasingly lead customers to dismiss the warning as a bug, enabling an attacker to maintain monitoring the sufferer for an prolonged interval,&#8221; researchers wrote.<\/p>\n<p>Google advised Wired it hasn&#8217;t seen a WhisperPair exploited within the wild and that it is up to date Discover Hub in Android to forestall attackers from utilizing the flaw to trace victims. Researchers advised the journal that the repair will be bypassed. <\/p>\n<p>In line with a timeline printed by the researchers, they first contacted Google in August 2025, and agreed to a 150 day disclosure window.<\/p>\n<p>Given the paucity of firmware updates utilized to audio equipment &#8211; whether or not as a result of customers do not trouble or producers do not develop them &#8211; it is seemingly that WhisperPair will persist as a vulnerability for years.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Endpoint Safety , Web of Issues Safety &#8216;WhisperPair&#8217; Flaw More likely to Endure for Years Greg Sirico \u2022 January 23, 2026 \u00a0 \u00a0 Picture: Melnikov Dmitriy\/Shutterstock A hacker may secretly document cellphone conversations, monitor customers&#8217; places and blast music by headphones because of a flaw in implementations of a Google-developed low-energy expertise for locating close [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11165,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[7240,2781,7562,2705,7563,3123,509],"class_list":["post-11163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-accessory","tag-audio","tag-converts","tag-flaw","tag-headphones","tag-spy","tag-tool"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11163"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11163\/revisions"}],"predecessor-version":[{"id":11164,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11163\/revisions\/11164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/11165"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 18:17:20 UTC -->