Hacker Can Steal Data from Air-Gapped Computers through Power Lines

Do you think it is possible to extract data from a computer using its power cables?

If no, then you should definitely read about this technique.

Researchers from Israel’s Ben Gurion University of the Negev—who majorly focus on finding clever ways to … Continue reading Hacker Can Steal Data from Air-Gapped Computers through Power Lines

Hacker Can Steal Data from Air-Gapped Computers Using IR CCTV Cameras

Air-gapped computers that are isolated from the Internet and physically separated from local networks are believed to be the most secure computers which are difficult to infiltrate.

However, these networks have been a regular target in recent years fo… Continue reading Hacker Can Steal Data from Air-Gapped Computers Using IR CCTV Cameras

10 Things You Need To Know About ‘Wikileaks CIA Leak’

Yesterday WikiLeaks published thousands of documents revealing top CIA hacking secrets, including the agency’s ability to break into iPhones, Android phones, smart TVs, and Microsoft, Mac and Linux operating systems.

It dubbed the first release as Vault 7.

Vault 7 is just the first part of leak series “Year Zero” that WikiLeaks will be releasing in coming days. Vault 7 is all about a covert

Continue reading 10 Things You Need To Know About ‘Wikileaks CIA Leak’

WikiLeaks Exposed CIA’s Hacking Tools And Capabilities Details

WikiLeaks has published a massive trove of confidential documents in what appear to be the biggest ever leak involving the US Central Intelligence Agency (CIA).

WikiLeaks announced series Year Zero, under which the whistleblower organization will reve… Continue reading WikiLeaks Exposed CIA’s Hacking Tools And Capabilities Details

This Malware Can Transfer Data via USB Emissions from Air-Gapped Computers

Air-gapped computers that are isolated from the Internet or other networks and believed to be the most secure computers on the planet have become a regular target in recent years.

A team of researchers from Ben-Gurion University in Israel has discovered a way to extract sensitive information from air-gapped computers – this time using radio frequency transmissions from USB connectors without

Continue reading This Malware Can Transfer Data via USB Emissions from Air-Gapped Computers

New Hack Uses Hard Drive’s Noise to Transfer Stolen Data from Air-Gapped Computer

Air-gapped computers that are isolated from the Internet and other computers are long considered to be the most secure and safest place for storing data in critical infrastructures such as industrial control systems, financial institutions, and classif… Continue reading New Hack Uses Hard Drive’s Noise to Transfer Stolen Data from Air-Gapped Computer