![]() ![]() This one, for instance, is about wiretapping smartphones by using their built-in accelerometer. We’ve published several stories on data-theft methods. Motherboards still typically feature one for compatibility, and it turns out that such a speaker can be used for data exfiltration. This type of attack may serve as a last resort for a malicious actor when no other, simpler methods are feasible.ĭata exfiltration in this case uses the computer’s speaker: not some plug-in device, but a relic of the first personal computers - the internal speaker, also known as the “PC speaker”. Researchers at Korea University in Seoul have published a paper detailing a new method of data theft from a computer that has maximum protection that is - placed in an isolated room and surrounded with an air gap (i.e., connected to neither the internet nor a local network). KasperskyPremium Support and Professional Services.KasperskyEndpoint Security for Business Advanced.KasperskyEndpoint Security for Business Select. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |