New Cyberattack Warning For Millions Of Home Internet Routers: Report

Most routers used at home have a “guest network” feature nowadays, providing friends, visitors and contractors the option to get online without (seemingly) giving them access to a core home network. Unfortunately, a new report from researchers at Israel’s Ben-Gurion University of the Negev has now suggested that enabling such guest networks introduces a critical security vulnerability. The advice […]
Academics steal data from air-gapped systems via a keyboard’s LEDs

CTRL-ALT-LED technique can exfiltrate data from air-gapped systems using Caps Lock, Num Lock, and Scroll Lock LEDs. The Caps Lock, Num Lock, and Scroll Lock LEDs on a keyboard can be used to exfiltrate data from a secure air-gapped system, academics from an Israeli university have proved. The attack, which they named CTRL-ALT-LED, is nothing […]
Signs from above: Drone with projector successfully trolls car AI

If the cars and the drones ever band together against us, we’re in trouble. After a recent demo using GNSS spoofing confused a Tesla, a researcher from Cyber@BGU reached out about an alternative bit of car tech foolery. The Cyber@GBU team recently demonstrated an exploit against a Mobileye 630 PRO Advanced Driver Assist System (ADAS) installed on a Renault Captur, and […]
New computer attack mimics user’s keystroke characteristics and evades detection

Ben-Gurion University of the Negev (BGU) cyber security researchers have developed a new attack called Malboard. Malboard evades several detection products that are intended to continuously verify the user’s identity based on personalized keystroke characteristics. The new paper, “Malboard: A Novel User Keystroke Impersonation Attack and Trusted Detection Framework Based on Side-Channel Analysis,” published in […]
Deployment Optimization of IoT Devices through Attack Graph Analysis
Noga Agmon, Asaf Shabtai, Rami Puzis Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, 11 Apr 2019 Link to document The Internet of things (IoT) has become an integral part of our lifeat both work and home. However, these IoT devices are prone to vulnerability exploits due to their low cost, […]
Should cyber-security be more chameleon, less rhino?

Billions are being lost to cyber-crime each year, and the problem seems to be getting worse. So could we ever create unhackable computers beyond the reach of criminals and spies? Israeli researchers are coming up with some interesting solutions. The key to stopping the hackers, explains Neatsun Ziv, vice president of cyber-security products at Tel […]
Computer virus alters cancer scan images

A computer virus that can add fake tumours to medical scan images has been created by cyber-security researchers. In laboratory tests, the malware altered 70 images and managed to fool three radiologists into believing patients had cancer. The altered images also managed to trick automated screening systems. The team from Israel developed the malicious software to […]
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici Department of Information Systems Engineering, Ben-Gurion University, Israel Soroka University Medical Center. 3 Apr 2019 Link to document In 2018, clinics and hospitals were hit with numerous attacksleading to significant data breaches and interruptions inmedical services. An attacker with access to medical recordscan do much more than […]
Hospital viruses: Fake cancerous nodes in CT scans, created by malware, trick radiologists

Researchers in Israel created malware to draw attention to serious security weaknesses in medical imaging equipment and networks. When Hillary Clinton stumbled and coughed through public appearances during her 2016 presidential run, she faced critics who said that she might not be well enough to perform the top job in the country. To quell rumors […]
BGU Researchers Outline Security, Privacy Threats Presented by Drone Use

The growing popularity of personal and commercial drone use in populated areas poses significant risks both for society and drones as a result of lack in additional technology that is required to secure both parties from one another. The lack of supporting technology could be exploited by malicious entities for cyberattacks, terrorism, crime and threats […]
Researchers warn open sky drone policy poses cybercriminal risk

Left unchecked, our drones may pose significant risks to our privacy and security. Drones flying over populated areas, unchecked, represent a real threat to our privacy, researchers have warned. On Wednesday, academics from Israel’s Ben-Gurion University of the Negev (BGU) and Fujitsu System Integration Laboratories revealed the results of a new study which examined over […]
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices
Nir Sivan, Ron Bitton, Asaf Shabtai Department of Software and Information Systems Engineering Ben-Gurion University of the Negev. 12 Dec 2018 Link to document In recent years we have witnessed a shift towards personalized, context-based applications and services for mobile device users. A key component of many of these services is the ability to infer […]