Ilya Draigor

COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers

An unconventional data exfiltration method leverages a previously undocumented covert channel to leak sensitive information from a...

Read More ...

ETHERLED: Air-gapped systems leak data via network card LEDs

Israeli researcher Mordechai Guri has discovered a new method to exfiltrate data from air-gapped systems using the LED indicators ...

Read More ...

New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals

A new method devised to leak information and jump over air-gaps takes advantage of Serial Advanced Technology Attachment (SATA) or...

Read More ...

Researchers defeat facial recognition systems with universal face mask

Can attackers create a face mask that would defeat modern facial recognition (FR) systems? A group of researchers from from Ben-Gu...

Read More ...

An Optical Spy Trick Can Turn Any Shiny Object Into a Bug

Anything from a metallic Rubik’s cube to an aluminum trash can inside a room could give away your private conversations. THE MOS...

Read More ...

ETHERNET CABLE TURNED INTO ANTENNA TO EXPLOIT AIR-GAPPED COMPUTERS

Good news, everyone! Security researcher [Mordechai Guri] has given us yet another reason to look askance at our computers and won...

Read More ...

Researchers Defeated Advanced Facial Recognition Tech Using Makeup

A new study used digitally and physically applied makeup to test the limits of state-of-the-art facial recognition software. Resea...

Read More ...

New “Glowworm attack” recovers audio from devices’ power LEDs

A new class of passive TEMPEST attack converts LED output into intelligible audio. Researchers at Ben-Gurion University of the Neg...

Read More ...

U.S.-Israel Energy Center announces winner of $6m funding for cybersecurity solutions in energy sector

The selected consortium, which included a number of American and Israeli companies and universities, will receive a total of $6 mi...

Read More ...

This new cyberattack can dupe DNA scientists into creating dangerous viruses and toxins

The research highlights the potential dangers of new ‘biohacking’ techniques. A new form of cyberattack has been devel...

Read More ...

Split-Second ‘Phantom’ Images Can Fool Tesla’s Autopilot

Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an internet-conne...

Read More ...

BGU researchers find it’s easy to get personal data from Zoom screenshots

Scientists warn that users should not post screen images of their video conference sessions on social media Personal data can easi...

Read More ...
Load more