New ways data can be stolen from air-gapped systems
Two fresh papers on the art of data exfiltration in scenarios where it seems utterly impossible.
59 articles
Two fresh papers on the art of data exfiltration in scenarios where it seems utterly impossible.
A paper from Uruguayan scientists lays out a highly technical and impractical method of spying on computer monitors.
We explain in simple terms research demonstrating a vulnerability in modern digital video cameras.
We review a recent research paper highlighting a major hardware vulnerability in Apple M1, M2, and M3 CPUs.
A recent study shows how it’s possible to identify typed text from the sound of keystrokes — even in far-from-ideal environments.
Researchers claim to have found a way to recover a fingerprint by… eavesdropping on a user swiping a finger across the screen!
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
A serious vulnerability in UEFI firmware relevant to a large number of modern computers, and even servers.
How a recently discovered bug in Intel processors threatens cloud providers.
How and why did American researchers try to extract sound from a video signal, and was it worth it?
We look at a new sophisticated attack on AMD and Intel integrated graphics cards.
Explaining an issue in popular PC and server CPUs in simple terms.
Researchers have come up with a way to exfiltrate confidential data by observing LED activity.
A brief, plain-language explanation of an advanced method of data theft using features of modern CPUs.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Better put them on something not very valuable or necessary. Here we explain why.
A method of stealing data from an air-gapped system through a speaker you may not even know is there.
One of the most curious and menacing bugs in Android smartphones, and the problems they had closing it.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Stealing data from an isolated network by manipulating the voltage switching converter.