User avatar

Researchers at Israel's Ben-Gurion University of the Negev and Shamoon College of Engineering said the malware establishes a two-way channel that attackers can use to communicate with compromised networks even when they're air-gapped. The covert channel can transmit data from a video camera to an attacker at 20 bits per second and from an attacker transmitter to a video camera at 100 bits per second. When more than a camera is used in the attacks the bit-rate may be increased further. https://arstechnica.com/information-technology/2017/09/attackers-can-use-surveillance-cameras-to-grab-data-from-air-gapped-networks/

Comment

(Key: IR LEDs in compromised surveillance cameras used to create optical links.)

 ‎· 9000 3
Comment

@9000: there is a COMPLETELY PLAUSIBLE technical explanation behind this headline, and YOU WILL BE SLIGHTLY annoyed that you did not have that idea yourself, even though IN RETROSPECT IT IS TOTALLY OBVIOUS.

 ‎· псы в рапиде
Comment

People who read Internet for fun and for some suspension of disbelief HATE HIM.

 ‎· псы в рапиде 1
Comment

@squadette: I like fun, but hate that WAIT FOR THE SURPRISE manner of writing in non-fiction texts. My time supply is acutely finite; I'm just afraid most everyone else's is, too. (To the ArsTechnica's credit, they have the explanation in the very first line.)

 ‎· 9000 2
Comment

@9000: HAS ACUTELY FINITE TIME SUPPLY @ HAS ACCOUNT ON MOKUM

 ‎· псы в рапиде 6
Comment

@squadette: No contradiction, because of high concentration of good content, most often neatly summarized!

 ‎· 9000 3
Comment

@9000: oh you smooth-talking bastard.

 ‎· псы в рапиде 3
Comment

a time to summarize and a time to be summarized

 ‎· хвост раздражают электрически 7
Comment

@9000 @squadette <3

 ‎· TODO: feathers 1

1 2 3 4 5 6 7 8 9 10