Security News




It costs less than $60. For just a few bucks, you can pick up a USB stick that destroys almost anything that it's plugged into. Laptops, PCs, televisions, photo booths -- you name it. Once a...




Researchers at Ben-Gurion University of Negev have found a way to take a run of the mill USB device and use it to leak data from an air gapped computers via RF signals.

After devising ways of exfiltrating data from air-gapped computers via mobile phones, using radio frequencies, heat, rogue software that transmits electromagnetic signals at cellular frequencies,...
