This new cyberattack can dupe DNA scientists into creating dangerous viruses and toxins
The research highlights the potential dangers of new ‘biohacking’ techniques. A new form of cyberattack has been developed which highlights the potential future ramifications of digital assaults against the biological research sector. On Monday, academics from the Ben-Gurion University of the Negev described how “unwitting” biologists and scientists could become victims of cyberattacks designed to […]
Split-Second ‘Phantom’ Images Can Fool Tesla’s Autopilot
Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an internet-connected billboard. SAFETY CONCERNS OVER automated driver-assistance systems like Tesla’s usually focus on what the car can’t see, like the white side of a truck that one Tesla confused with a bright […]
BGU researchers find it’s easy to get personal data from Zoom screenshots
Scientists warn that users should not post screen images of their video conference sessions on social media Personal data can easily be extracted from Zoom and other video conference applications, researchers from Ben Gurion University of the Negev announced today. The Israeli researchers examined Zoom, Microsoft Teams and Google Meet and warned that users should […]
Spies Can Eavesdrop by Watching a Light Bulb’s Vibrations
The so-called lamphone technique allows for real-time listening in on a room that’s hundreds of feet away. THE LIST OF sophisticated eavesdropping techniques has grown steadily over years: wiretaps, hacked phones, bugs in the wall—even bouncing lasers off of a building’s glass to pick up conversations inside. Now add another tool for audio spies: Any light bulb […]
New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers
Cybersecurity researcher Mordechai Guri from Israel’s Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices. Dubbed ‘POWER-SUPPLaY,’ the latest research builds […]
Israel Warns: Hackers Can Threaten Getting CoronaVirus Under Control
For they assailed you by the trickery they practiced against you because of the affair of Peor and because of the affair of their kinswoman Cozbi, daughter of the Midianite chieftain, who was killed at the time of the plague on account of Peor.” Numbers 25:18 The new coronavirus, Covid-2019 – that has infected more than 80,000 people […]
Exfiltrating Data from Air-Gapped Computers Using Screen Brightness
It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightness of the screen, new cybersecurity research shared with The Hacker News revealed. In recent years, several cybersecurity researchers demonstrated innovative ways to covertly exfiltrate data from a physically isolated air-gapped computer that can’t connect […]
How a $300 projector can fool Tesla’s Autopilot
Semi-autonomous driving systems don’t understand projected images. Six months ago, Ben Nassi, a PhD student at Ben-Gurion University advised by Professor Yuval Elovici, carried off a set of successful spoofing attacks against a Mobileye 630 Pro Driver Assist System using inexpensive drones and battery-powered projectors. Since then, he has expanded the technique to experiment—also successfully—with confusing a Tesla Model […]
Actuator Power Signatures Defend Against Additive Manufacturing Sabotage Attacks
Researchers have come together from the US and Israel to study potential threats that could affect additive manufacturing systems. While this does not affect the DIY user fabricating parts and prototypes from the home workshop as much, the authors of ‘Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures’ are concerned about ‘AM’s dependence […]
Did you really ‘like’ that? How Chameleon attacks spring in Facebook, Twitter, LinkedIn
Social networks impacted seem to disagree on the scope of the attack. Social networks are full to the brim with our photos, posts, comments, and likes — the latter of which may be abused by attackers for the purposes of incrimination. A new paper, titled “The Chameleon Attack: Manipulating Content Display in Online Social Media,” […]
Singapore undergrads cut their teeth in Israel – land of start-ups and tech
Just before a group of Singaporean students made their way to Israel in May, worry hung over their heads. Rockets had been fired from the Gaza Strip, hitting the southern Israeli city of Beersheba, where a few of the students from the Singapore University of Technology and Design (SUTD) were headed for an internship. No […]
New Cyberattack Warning For Millions Of Home Internet Routers: Report
Most routers used at home have a “guest network” feature nowadays, providing friends, visitors and contractors the option to get online without (seemingly) giving them access to a core home network. Unfortunately, a new report from researchers at Israel’s Ben-Gurion University of the Negev has now suggested that enabling such guest networks introduces a critical security vulnerability. The advice […]