News & Press

Submitted by Cyber Labs on Sun, 05/02/2017 - 11:00

Global entities come shopping for Israeli cybersecurity

At Tel Aviv confab, prime minister announces new National Center for Cyber Education to keep Israel's young generations at the top of the cyber game.

As computer devices and Internet of Things (IoT) connectivity continue to break new boundaries and create changes to our lifestyle, new cybersecurity technologies to defend our tech-savvy lives are crucial.

Tags: 

Submitted by Cyber Labs on Sun, 05/02/2017 - 10:57

NTU Singapore and Ben-Gurion University Ink Partnership to Combat Advanced Cyber Threats

Nanyang Technological University (NTU Singapore) and Ben-Gurion University of the Negev (BGU) are collaborating to find innovative ways to counter cyber threats.

Tags: 

Submitted by Cyber Labs on Sun, 05/02/2017 - 10:50

First of its kind Cyber Cooperation Agreement signed between BGU and NTU

During the Cybertech Singapore conference, the Israeli Ben-Gurion University and the Singaporean Nanyang Technological University signed an extensive cooperation agreement which will focus on cyber issues

Tags: 

Submitted by Cyber Labs on Sun, 22/01/2017 - 11:44

New Smartwatch Application for Accurate Signature Verification Developed by Ben-Gurion University of the Negev and Tel Aviv University Researchers

An innovative, new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by BGU and TAU researchers. 

Submitted by Mordechai Guri on Tue, 16/08/2016 - 08:49

DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise

DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise. By Security Researcher Mordechai Guri and Yosef Solewicz, Andrey Daidakulov and Yuval Elovici

Link: https://arxiv.org/abs/1608.03431

Submitted by Mordechai Guri on Wed, 29/06/2016 - 23:45

Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers

Because computers may contain or interact with sensitive information, they are often air-gapped and in this way kept isolated and disconnected from the Internet. In recent years the ability of malware to communicate over an air-gap by transmitting sonic and ultrasonic signals from a computer speaker to a nearby receiver has been shown. In order to eliminate such acoustic channels, current best practice recommends the elimination of speakers (internal or external) in secure computers, thereby creating a so-called 'audio-gap'.

Submitted by Cyber Security ... on Mon, 23/03/2015 - 14:31

BitWhisper: The Heat is on the Air-Gap

UPDATE 30 Mar 2015: A draft of the research paper is available for download here

Submitted by Cyber Security ... on Sun, 02/11/2014 - 20:23

Can We Rely on an Air-Gap to Secure our Critical Systems?

Following our recent disclosure on how to breach air gap security with a simple mobile phone and RF emitted from the air-gapped computer we wanted to provide some overview on the topic.

The following is a lecture by Prof. Yuval Elovici, the head of the cyber security research labs, on air gap security, latest threats and developments.

Pages