News & Press
A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers from BGU and the Weizmann Institute of Science.
As WikiLeaks allegedly revealed thousands of pages about US Intelligence agencies’ cyber-espionage capabilities, and as hackers continue to broaden their avenues of attack, one of the vulnerabilities revealed was smart TVs. However, Prof. Ofer Hadar (pictured left), Chair of BGU's Department of Communication Systems Engineering warns that the threat is actually much greater.
“Any video or picture downloaded or streamed by a user is a potential vehicle for a cyber-attack. What’s more, hackers like videos and pictures because they bypass the regular data transfer systems of even secure systems and there is a lot of space to implant malicious code,” says Hadar.
Researchers at BGU's Cyber Security Research Center have demonstrated that data can be stolen from an isolated "air-gapped" computer's hard drive reading the pulses of light on the LED drive using various types of cameras and light sensors.
At Tel Aviv confab, prime minister announces new National Center for Cyber Education to keep Israel's young generations at the top of the cyber game.
As computer devices and Internet of Things (IoT) connectivity continue to break new boundaries and create changes to our lifestyle, new cybersecurity technologies to defend our tech-savvy lives are crucial.
During the Cybertech Singapore conference, the Israeli Ben-Gurion University and the Singaporean Nanyang Technological University signed an extensive cooperation agreement which will focus on cyber issues
An innovative, new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by BGU and TAU researchers.
DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise. By Security Researcher Mordechai Guri and Yosef Solewicz, Andrey Daidakulov and Yuval Elovici
Because computers may contain or interact with sensitive information, they are often air-gapped and in this way kept isolated and disconnected from the Internet. In recent years the ability of malware to communicate over an air-gap by transmitting sonic and ultrasonic signals from a computer speaker to a nearby receiver has been shown. In order to eliminate such acoustic channels, current best practice recommends the elimination of speakers (internal or external) in secure computers, thereby creating a so-called 'audio-gap'.