Skip to content

MIIS CySec

Cyber Security Initiative at MIIS, a Graduate School of Middlebury College

  • Home
  • About Us
    • MIIS Cyber Director
    • MIIS Cyber Fellows
    • MIIS Cyber Partners
    • MIIS Cyber Nodes
      • Faculty and Staff
      • IT and Media Specialists
      • Resource Centers
    • Cyber Security Student Working Group (CSWG)
  • Activities
    • MIIS Courses
    • Events
      • Executive Education
      • Key Leader Engagement
      • Publications & Presentations
      • MIIS Speaker Series
      • Additional Activities
    • Speaker Series
    • Speaker Series Videos
    • Russia, Ukraine and Cyber Threats Forum 2014
  • Resources
    • Resource Links by Category
      • Academic and Think-Tank Resources
      • Cyber Hygiene
      • International Resources
      • News and Blog Resources
      • Training
      • Private Sector Resources
      • Terminology Resources
      • United States Government Links
    • Visualizing Cyber
      • Global Cyber Policy Map
      • Global Digital Attack Maps
    • Featured Cyberspace Events
  • News & Publications
    • MIIS Cyber Blog
  • Contact Us
  • MIIS Home Page
MIIS CySec

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

Radio-frequency hack developed by researchers in Israel would let attackers steal data remotely from even air-gapped computers not connected to the internet.

The post How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data appeared first on WIRED.



This entry was posted in Cyber Espionage, News, Persistent Threats, Surveillance, Vulnerabilities on November 3, 2014 by Kim Zetter.

Post navigation

← WW2 Technology ‘Plan B’ for GPS Hacker Lexicon: What Is Homomorphic Encryption? →
MCySec Newsfeed Archive

Meta

  • Log in
  • Entries RSS
  • Comments RSS
  • The Middlebury Sites Network
Proudly powered by WordPress