The Latest in IT Security

Posts Tagged ‘Researchers’

A group of researchers from Georgetown University and UC Berkeley have demonstrated how voice commands hidden in YouTube videos can be used by malicious attackers to compromise smartphones. In order for the attack to work, the target smartphones have to have Apple Siri or Google Now – the intelligent personal assistant software that uses a […]

Read more ...

Researchers have developed a network architecture they claim is a dramatically more efficient way for users to interact anonymously. Researchers from the Massachusetts Institute of Technology and the Swiss École Polytechnique Fédérale de Lausanne collaborated on the project, known as “Riffle networking.”

Read more ...

For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, using radio frequencies (“AirHopper”); using heat (“BitWhisper”), using rogue software (“GSMem”) that modulates and transmits electromagnetic signals at cellular frequencies. The latest version of the data-exfiltration attack against […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments