Hacker Can Steal Data from Air-Gapped Computers through Power Lines

Do you think it is possible to extract data from a computer using its power cables?

If no, then you should definitely read about this technique.

Researchers from Israel’s Ben Gurion University of the Negev—who majorly focus on finding clever ways to … Continue reading Hacker Can Steal Data from Air-Gapped Computers through Power Lines

Alex Stamos, Facebook, Uber, and The Cuban Sonic Weapon – Paul’s Security Weekly #552

The Scarlett Johansson PostgreSQL Malware Attack, Alex Stamos might be leaving Facebook, is Mark Zuckerburg in trouble with the law again?, Uber self-driving car hits and kills pedestrian, and CIS releases revised top-20 critical security controls. Pau… Continue reading Alex Stamos, Facebook, Uber, and The Cuban Sonic Weapon – Paul’s Security Weekly #552

The Black Swan: Mitigating Cyber Attacks Within ICS Environments

ICSs are specialized resulting in limited industry expertise spanning ICS, IT, and security. In terms of mitigation techniques, most vendors and organizations leverage generic security methodologies resulting in a reactive approach. RSA Advanced Cyber … Continue reading The Black Swan: Mitigating Cyber Attacks Within ICS Environments

Hackers Exploit Right-to-Left Override Bug in Telegram to Distribute Malware

Hackers have exploited a bug in how Telegram’s Windows messaging client displays file names that contain a right-to-left override (RLO) character, to infect users with malware. The RLO character, represented by “U+202E” in Unicode, in… Continue reading Hackers Exploit Right-to-Left Override Bug in Telegram to Distribute Malware

Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers

A team of security researchers—which majorly focuses on finding clever ways to get into air-gapped computers by exploiting little-noticed emissions of a computer’s components like light, sound and heat—have published another research showcasing that th… Continue reading Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers