Category: Uncategorized

ETHERNET CABLE TURNED INTO ANTENNA TO EXPLOIT AIR-GAPPED COMPUTERS

Good news, everyone! Security researcher [Mordechai Guri] has given us yet another reason to look askance at our computers and won...

Read More ...

Researchers Defeated Advanced Facial Recognition Tech Using Makeup

A new study used digitally and physically applied makeup to test the limits of state-of-the-art facial recognition software. Resea...

Read More ...

New “Glowworm attack” recovers audio from devices’ power LEDs

A new class of passive TEMPEST attack converts LED output into intelligible audio. Researchers at Ben-Gurion University of the Neg...

Read More ...

U.S.-Israel Energy Center announces winner of $6m funding for cybersecurity solutions in energy sector

The selected consortium, which included a number of American and Israeli companies and universities, will receive a total of $6 mi...

Read More ...

This new cyberattack can dupe DNA scientists into creating dangerous viruses and toxins

The research highlights the potential dangers of new ‘biohacking’ techniques. A new form of cyberattack has been devel...

Read More ...

Split-Second ‘Phantom’ Images Can Fool Tesla’s Autopilot

Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than half a second on an internet-conne...

Read More ...

BGU researchers find it’s easy to get personal data from Zoom screenshots

Scientists warn that users should not post screen images of their video conference sessions on social media Personal data can easi...

Read More ...

Spies Can Eavesdrop by Watching a Light Bulb’s Vibrations

The so-called lamphone technique allows for real-time listening in on a room that’s hundreds of feet away.  THE LIST OF&nbs...

Read More ...

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

Cybersecurity researcher Mordechai Guri from Israel’s Ben Gurion University of the Negev recently demonstrated a new kind of...

Read More ...

Israel Warns: Hackers Can Threaten Getting CoronaVirus Under Control

For they assailed you by the trickery they practiced against you because of the affair of Peor and because of the affair of thei...

Read More ...

Exfiltrating Data from Air-Gapped Computers Using Screen Brightness

It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightnes...

Read More ...

How a $300 projector can fool Tesla’s Autopilot

Semi-autonomous driving systems don’t understand projected images. Six months ago, Ben Nassi, a PhD student at Ben-Guri...

Read More ...
Load more