Futurist Keynote, Warrington: The Future of Industrial Controls Nuclear Security, Cyber Senate

Futurist Keynote, Warrington: The Future of Industrial Controls Nuclear Security, Cyber Senate

WHY THIS MATTERS IN BRIEF Industrial Control Systems (ICS) that enable the safe and efficient operation of our CNI assets are becoming increasingly smart and connected, making them more vulnerable to attack, and new technologies bring  new challenges.   Firstly, thanks to James for inviting me to be the keynote...

Read more
Hackers use electromagnetic attack to steal data from air gapped systems

Hackers use electromagnetic attack to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Faraday cages are supposed to be the ultimate in stopping air gapped computer systems from being attacked and their data exfiltrated, but hackers in Israel have just proved that’s no longer the case.   Two common methods of physical cybersecurity, air gapping and Faraday cages,...

Read more
Hackers use infra red CCTV cameras to steal data from air gapped systems

Hackers use infra red CCTV cameras to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Air gapped computer systems that often hold highly sensitive data are generally thought to be secure, but more hackers are testing that theory than ever before.   Even the cleverest malware is stranded unless it can communicate with the people who sent it. This can...

Read more
Hackers found a way to steal data from air gapped networks using powerlines

Hackers found a way to steal data from air gapped networks using powerlines

WHY THIS MATTERS IN BRIEF Air gapped systems normally hold highly sensitive and secret data, and the number of ways to exfiltrate data from them, once compromised, is growing.   Hot on the heels of exploits that use fan noise, infra red cameras, heat, LED lights and drones, magnetic fields and...

Read more
Researchers hack classified air gapped systems using drones and LED’s

Researchers hack classified air gapped systems using drones and LED’s

WHY THIS MATTERS IN BRIEF Air gapped systems are used to hold and protect top secret data, and they’re becoming increasingly vulnerable to hacks.   Air gapped computer systems have always held a special fascination for hackers – firstly because of the challenge that surrounds being able to hack a...

Read more
Researchers listen in to crack 4096-bit encryption

Researchers listen in to crack 4096-bit encryption

WHY THIS MATTERS IN BRIEF Researchers have used sound to break the worlds’ toughest encryption standard.   Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is...

Read more