Category: Uncategorized
An Optical Spy Trick Can Turn Any Shiny Object Into a Bug
Anything from a metallic Rubik’s cube to an aluminum trash can inside a room could give away your private conversations. THE MOS...
Read More ...ETHERNET CABLE TURNED INTO ANTENNA TO EXPLOIT AIR-GAPPED COMPUTERS
Good news, everyone! Security researcher [Mordechai Guri] has given us yet another reason to look askance at our computers and won...
Read More ...Researchers Defeated Advanced Facial Recognition Tech Using Makeup
A new study used digitally and physically applied makeup to test the limits of state-of-the-art facial recognition software. Resea...
Read More ...New “Glowworm attack” recovers audio from devices’ power LEDs
A new class of passive TEMPEST attack converts LED output into intelligible audio. Researchers at Ben-Gurion University of the Neg...
Read More ...U.S.-Israel Energy Center announces winner of $6m funding for cybersecurity solutions in energy sector
The selected consortium, which included a number of American and Israeli companies and universities, will receive a total of $6 mi...
Read More ...This new cyberattack can dupe DNA scientists into creating dangerous viruses and toxins
The research highlights the potential dangers of new ‘biohacking’ techniques. A new form of cyberattack has been devel...
Read More ...Split-Second ‘Phantom’ Images Can Fool Tesla’s Autopilot
Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an internet-conne...
Read More ...BGU researchers find it’s easy to get personal data from Zoom screenshots
Scientists warn that users should not post screen images of their video conference sessions on social media Personal data can easi...
Read More ...Spies Can Eavesdrop by Watching a Light Bulb’s Vibrations
The so-called lamphone technique allows for real-time listening in on a room that’s hundreds of feet away. THE LIST OF&nbs...
Read More ...New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers
Cybersecurity researcher Mordechai Guri from Israel’s Ben Gurion University of the Negev recently demonstrated a new kind of...
Read More ...Israel Warns: Hackers Can Threaten Getting CoronaVirus Under Control
For they assailed you by the trickery they practiced against you because of the affair of Peor and because of the affair of thei...
Read More ...Exfiltrating Data from Air-Gapped Computers Using Screen Brightness
It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightnes...
Read More ...