Self-Driving or Mind Control? Which Do You Prefer?

We know you love a good biohack as much as we do, so we thought you would like [Tony’s] brainwave-controlled RC truck. Instead of building his own electroencephalogram (EEG), he …read more Continue reading Self-Driving or Mind Control? Which Do You Prefer?

How Early Radio Receivers Worked

If you’ve ever built a crystal radio, there’s something magical about being able to pull voices and music from far away out of thin air. If you haven’t built one, maybe you should while there’s still something on the AM band. Of course, nowadays the equivalent might an SDR. But …read more

Continue reading How Early Radio Receivers Worked

Securing Enterprises From RF Exploitation

RF attacks are on the rise as more organizations employ wireless networks. Here’s how to keep your networks safe What do the Dallas tornado siren attack, hacked health performance monitors and compromised wearables have in common? Vulnerable wir… Continue reading Securing Enterprises From RF Exploitation

How one security researcher used radio signals to hop an air gap

For years, researchers and spies have devised ways of getting malware to computers that are “air-gapped,” or physically isolated from external network connections. Attacks like Stuxnet, the computer worm deployed against an Iranian nuclear facility a decade ago, shattered the myth that air-gapped systems are impenetrable fortresses. In that case, suspected U.S. and Israeli intelligence operatives crossed an air gap with malware that ultimately sabotaged centrifuges at a uranium enrichment plant. They also planted an idea in the head of Mikhail Davidov, an ethical hacker: Getting malicious code into an air-gapped computer is one thing, but how do you retrieve data from the network? One possibility, it turns out, is in the radio spectrum. With a radio, antenna, and his own computer script, Davidov figured out how to use a signal emitted by an air-gapped computer’s graphics processing unit (GPU) to exfiltrate data. Davidov, the lead security researcher at Duo […]

The post How one security researcher used radio signals to hop an air gap appeared first on CyberScoop.

Continue reading How one security researcher used radio signals to hop an air gap

Raspberry Pi 4 HDMI is Jamming Its Own WiFi

Making upgrades to a popular product line might sound like a good idea, but adding bigger/better/faster parts to an existing product can cause unforeseen problems. For example, dropping a more powerful engine in an existing car platform might seem to work at first until people start reporting that the increased …read more

Continue reading Raspberry Pi 4 HDMI is Jamming Its Own WiFi

Understanding Modulated RF With [W2AEW]

There was a time — not long ago — when radio and even wired communications depended solely upon Morse code with OOK (on off keying). Modulating RF signals led to practical commercial radio stations and even modern cell phones. Although there are many ways to modulate an RF carrier with voice AM or amplitude modulation is the oldest method. A recent video from [W2AEW] shows how this works and also how AM can be made more efficient by stripping the carrier and one sideband using SSB or single sideband modulation. You can see the video, below.

As is typical of …read more

Continue reading Understanding Modulated RF With [W2AEW]