New International Cyber Security and Machine Learning Academic and Professional Program (ICSML) opens at BGU

The first International Summer program in Data Mining and Business Intelligence with a focus in Cyber Security Applications recently opened at BGU.  The International Cyber Security and Machine Learning Academic and Professional Program (ICSML) is a collaboration of BGU’s Office of International Academic Affairs and Malware Lab and the Cyber Security Research Center.  ICSML is led by Dr. Nir Nissim, researcher and […]

Wirtschaftswunderland

Das winzige Israel ist ein Paradies für Hightech-Firmen. Dank einer einzigartigen Zusammenarbeit von Wirtschaft, Forschung, Staat und Militär. Es gibt Momente, da lässt sich leicht vergessen, dass Israel ein Hightech-Staat ist. Jerusalems schlechtere Viertel sind vermüllt und verstaubt wie ein Slum. Tel Aviv, die Start-up-Hauptstadt, hat es bis heute nicht geschafft, eine Straßenbahn zu bauen. […]

Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers

Because computers may contain or interact with sensitive information, they are often air-gapped and in this way kept isolated and disconnected from the Internet. In recent years the ability of malware to communicate over an air-gap by transmitting sonic and ultrasonic signals from a computer speaker to a nearby receiver has been shown. In order […]

Semantic-Security Capacity for the Physical Layer via Information Theory

In collaboration with Princeton University Z. Goldfeld, P. Cuff and H. H. Permuter In Proceedings of the IEEE CS International Conference on Software Science, Technology, and Engineering (SwSTE-2016), Beer-Sheva, Israel, June 2016 Link to document Physical layer security can ensure secure communication over noisy channels in the presence of an eavesdropper with unlimited computational power. […]

Clever Attack Uses the Sound of a Computer’s Fan to Steal Data

IN THE PAST two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that, for security reasons, are never connected to the internet or connected to other machines that are connected to the internet, making it difficult to extract data from them. Mordechai […]

A Bug in Chrome Makes It Easy to Pirate Movies

FOR YEARS HOLLYWOOD has waged a war on piracy, using digital rights management technologies to fight bootleggers who illegally copy movies and distribute them. For just as long, hackers have found ways to bypass these protections. Now two security researchers have found a new way, using a vulnerability in the system Google uses to stream media […]

GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies

Air-gapped networks are isolated, separated both logically and physically from public networks. Although the feasibility of invading such systems has been demonstrated in recent years, exfiltration of data from air-gapped networks is still a challenging task. In this paper we present GSMem, a malware that can exfiltrate data through an air-gap over cellular frequencies. Rogue […]

HACKERS AND COMPANIES ALIKE FINDING CLEVER NEW WAYS TO CIRCUMVENT PRIVACY

Hackers and companies alike are increasingly able to discern identifying information about people, such as their gender, based on indirect data. Most people know, at this stage, that the little computer they carry around in their pocket tracks their location, taking note of their every move. Those concerned with their privacy might, for example, block […]

Israel’s desert city of Beersheba is turning into a cybertech oasis

Israel’s first prime minister, David Ben Gurion famously said that the future of Israel lies in the Negev, a desert located in southern Israel. Ben Gurion’s prophetic words ring true today as Beersheba, Israel’s southern capital, is morphing into a tech oasis. The military’s massive relocation of its prestigious technology units, the presence of multinational […]

Botnets Plague the Web. This AI Is Out to Stop Them

Israeli researchers say they’re the first to use machine learning to identify where botnets are located. Bot networks still wreak havoc online. Millions of hacks, spam operations and online fraud campaigns perpetrated by botnets in recent years have done serious damage to law-abiding internet users: In the U.S. alone, botnets have caused over $9 billion […]

Israel’s Cyber Sector Blooms in the Desert

A modern metropolis rising from Israel’s Negev desert stands on the frontline of a global war against hacking and cyber crime, fulfilling an ambition of the country’s founding father. David Ben Gurion famously said he wanted to make the Negev bloom. Today, in the streets of Beersheba, a city of 200,000, his dream is taking […]

Skip to content