Israeli researchers newest hack uses fans to steal classified data from top secret servers

Israeli researchers newest hack uses fans to steal classified data from top secret servers

WHY THIS MATTERS IN BRIEF Security is a game of cat and mouse, and there are plenty of ways to steal top secret data …   Interested in the Exponential Future? Connect, download a free E-Book, watch a keynote, or browse my blog. If you have top secret data to protect like, in today’s time...

Read more
Hackers use electromagnetic attack to steal data from air gapped systems

Hackers use electromagnetic attack to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Faraday cages are supposed to be the ultimate in stopping air gapped computer systems from being attacked and their data exfiltrated, but hackers in Israel have just proved that’s no longer the case.   Two common methods of physical cybersecurity, air gapping and Faraday cages,...

Read more
Hackers use infra red CCTV cameras to steal data from air gapped systems

Hackers use infra red CCTV cameras to steal data from air gapped systems

WHY THIS MATTERS IN BRIEF Air gapped computer systems that often hold highly sensitive data are generally thought to be secure, but more hackers are testing that theory than ever before.   Even the cleverest malware is stranded unless it can communicate with the people who sent it. This can...

Read more
Hackers found a way to steal data from air gapped networks using powerlines

Hackers found a way to steal data from air gapped networks using powerlines

WHY THIS MATTERS IN BRIEF Air gapped systems normally hold highly sensitive and secret data, and the number of ways to exfiltrate data from them, once compromised, is growing.   Hot on the heels of exploits that use fan noise, infra red cameras, heat, LED lights and drones, magnetic fields and...

Read more
Researchers hack classified air gapped systems using drones and LED’s

Researchers hack classified air gapped systems using drones and LED’s

WHY THIS MATTERS IN BRIEF Air gapped systems are used to hold and protect top secret data, and they’re becoming increasingly vulnerable to hacks.   Air gapped computer systems have always held a special fascination for hackers – firstly because of the challenge that surrounds being able to hack a...

Read more