The Latest in IT Security

Posts Tagged ‘air-gapped’

For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, using radio frequencies (“AirHopper”); using heat (“BitWhisper”), using rogue software (“GSMem”) that modulates and transmits electromagnetic signals at cellular frequencies. The latest version of the data-exfiltration attack against […]

Read more ...

According to a new Chatham House report: #cyber security at Civil #nuclear facilities: Understanding the #risks, the risk of serious cyber-attacks on civil nuclear facilities is growing. With increased reliance on #digital systems, the use of commercial off-the-shelf software, and connecting to the Internet increases susceptibility for a cyberattack. The myth: “We are safe from […]

Read more ...

Newly designed malware could, if properly replicated, allow an attacker to pick up the data of air-gapped computers, which are typically thought of as relatively secure. GSMem, as the researchers call it, exploits electromagnetic radiation (EMR) emissions and forces a computer’s memory bus to function similarly to an antenna in order to wirelessly transmit data […]

Read more ...


Categories

THURSDAY, APRIL 18, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments