Tag: Air gapped vulnerabilities
You are here: Home \ Air gapped vulnerabilities
Proof-of-concept malware called aIR-Jumper can be used to bypass air-gapped network protections and send data in and out of network.
A group of academic researchers have figured out how to use off-the-shelf computer equipment and a standard Wi-Fi connection to sniff out keystrokes coming from someone typing on a keyboard nearby. The keystroke recognition technology, called WiKey, isn’t perfect, but is impressive with a reported 97.5 percent accuracy under a controlled environment. WiKey is similar...