Apple's New MacBook Disconnects Microphone "Physically" When Lid is Closed

 October 31, 2018  Mohit Kumar Apple introduces a new privacy feature for all new MacBooks that "at some extent" will prevent hackers and malicious applications from eavesdropping on your conversations. Apple's custom T2 security chip in the latest MacBooks includes a new hardware feature that physically disconnects the MacBook's built-in microphone whenever the user closes the lid, the company revealed yesterday at its event at the Brooklyn Academy of Music in New York. Though the new T2 chip is already present in the 2018 MacBook Pro models launched earlier this year, this new feature got unveiled when Apple launched the new Retina MacBook Air and published a full security guide for T2 Chip yesterday. "This disconnect is implemented in hardware alone, and therefore prevents any software, even with root or kernel privileges in macOS, and even the software on the T2 chip, from engaging the microphone when the lid is closed,&qu

What Is Hacking?

Computer in dark office, security alert on screenIn computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term hacking historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on networks and computers over the internet.

Origins of Hacking

M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the hacks perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.
Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the internet became popular, for example, several hackers in the U.S. experimented with methods to illegally modify telephones so they could make free long-distance calls over the phone network.
As computer networking and the internet exploded in popularity, data networks became by far the most common target of hackers and hacking.

Well-Known Hackers

Many of the world's most famous hackers began their exploits at a young age. Some were convicted of major crimes and served time for their offenses. To their credit, some of them also rehabilitated and turned their skills into productive careers.
Hardly a day goes by that you don't hear something about a hack or a hacker in the news. Now, however, hacks affect millions of computers connected to the internet, and the hackers are often sophisticated criminals.

Hacking vs. Cracking

While true hacking once applied only to activities having good intentions, and malicious attacks on computer networks were officially known as cracking, most people no longer make this distinction. It is extremely common to see the term hack used to refer to activities once known only as cracks.

Common Network Hacking Techniques

Hacking on computer networks is often done through scripts and other network software. These specially-designed software programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works. Many such pre-packaged scripts are posted on the internet for anyone—typically entry-level hackers—to use. Advanced hackers may study and modify these scripts to develop new methods. A few highly skilled hackers work for commercial firms, hired to protect that companies' software and data from outside hacking.
Cracking techniques on networks include creating worms, initiating a denial of service (DoS) attacks, and establishing unauthorized remote access connections to a device. Protecting a network and the computers attached to it from malware, phishing, Trojans, and unauthorized access is a full-time job and vitally important.

Hacking Skills

Effective hacking requires a combination of technical skills and personality traits:
  • The ability to work with numbers and mathematics is essential. Hacking often requires sorting through large amounts of data, code and computer algorithms.
  • Memory recall and logical reasoning are needed because hacking involves assembling small facts and details—sometimes from many sources—into a plan of attack based on the logic of how computer systems work.
  • Patience. Hacks tend to be complex and require large amounts of time to plan and execute.

Cybersecurity

Cybersecurity is an important career choice as our economy is increasingly based on internet access. Cybersecurity experts work to identify malicious code and prevent hackers from accessing networks and computers. Unless you work in cybersecurity, where you have a good reason to be familiar with hacks and cracks, it is best not to test your hacking skills. Attacking networks and computers is illegal, and the penalties are severe.