Thomas Brewster-Fox from Forbes reports on research from Israel’s Ben Gurion University showing "a novel, silent and cheap method for transmitting data, such as sound recordings or location data of a target, to a spy’s server. [...] for just $3, [an attacker] could install a small device in a business card or even a sticker (yes, even the tiny kind that Mark Zuckerberg puts on his webcam) that would use an audio signal to force a phone or tablet gyroscope to vibrate at its resonant frequency. This would be registered by code running on the target’s phone – most likely within an innocent-looking web page – that queries the gyroscope as quickly as possible, uploading its reading to a server. If, for instance, the implant is recording audio and location, it can transmit that information in 1s and 0s at a fairly fast rate – hundreds of bits per second of data – by just activating and deactivating the gyroscope. The website code would accept those bits and turn them into something useful, like the latitude and longitude of the unfortunate victim"