Ilya Draigor

Spies Can Eavesdrop by Watching a Light Bulb’s Vibrations

The so-called lamphone technique allows for real-time listening in on a room that’s hundreds of feet away.  THE LIST OF&nbs...

Read More ...

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

Cybersecurity researcher Mordechai Guri from Israel’s Ben Gurion University of the Negev recently demonstrated a new kind of...

Read More ...

Israel Warns: Hackers Can Threaten Getting CoronaVirus Under Control

For they assailed you by the trickery they practiced against you because of the affair of Peor and because of the affair of thei...

Read More ...

Exfiltrating Data from Air-Gapped Computers Using Screen Brightness

It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightnes...

Read More ...

How a $300 projector can fool Tesla’s Autopilot

Semi-autonomous driving systems don’t understand projected images. Six months ago, Ben Nassi, a PhD student at Ben-Guri...

Read More ...

Actuator Power Signatures Defend Against Additive Manufacturing Sabotage Attacks

Researchers have come together from the US and Israel to study potential threats that could affect additive manufacturing systems....

Read More ...

Did you really ‘like’ that? How Chameleon attacks spring in Facebook, Twitter, LinkedIn

Social networks impacted seem to disagree on the scope of the attack. Social networks are full to the brim with our photos, posts,...

Read More ...

Singapore undergrads cut their teeth in Israel – land of start-ups and tech

Just before a group of Singaporean students made their way to Israel in May, worry hung over their heads. Rockets had been fired f...

Read More ...

New Cyberattack Warning For Millions Of Home Internet Routers: Report

Most routers used at home have a “guest network” feature nowadays, providing friends, visitors and contractors the opt...

Read More ...

Academics steal data from air-gapped systems via a keyboard’s LEDs

CTRL-ALT-LED technique can exfiltrate data from air-gapped systems using Caps Lock, Num Lock, and Scroll Lock LEDs. The Caps Lock,...

Read More ...

Signs from above: Drone with projector successfully trolls car AI

If the cars and the drones ever band together against us, we’re in trouble. After a recent demo using GNSS spoofin...

Read More ...

New computer attack mimics user’s keystroke characteristics and evades detection

Ben-Gurion University of the Negev (BGU) cyber security researchers have developed a new attack called Malboard. Malboard evades s...

Read More ...
Load more