[HackerNews] New Glowworm Attack Recovers Device’s Sound from Its LED Power Indicator

A novel technique leverages optical emanations from a device’s power indicator LED to recover sounds from connected peripherals and spy on electronic conversations from a distance of as much as 35 meters.
Dubbed the “Glowworm attack,” the findings were published by a group of academics from the Ben-Gurion University of the Negev earlier this week, describing the method as “an optical TEMPEST 

Source: Read More (The Hacker News)

You might be interested in …

[SecurityWeek] Russia’s APT29 Still Actively Delivering Malware Used in COVID-19 Vaccine Spying

All posts, Security Week

The Russian cyberespionage group known as APT29 and Cozy Bear is still actively delivering a piece of malware named WellMess, despite the fact that the malware was exposed and detailed last year by Western governments. read more Source: Read More (SecurityWeek RSS Feed)

Read More

[SANS ISC] Correctly Validating IP Addresses: Why encoding matters for input validation., (Mon, May 10th)

All posts, Sans-ISC

Recently, a number of libraries suffered from a very similar security flaw: IP addresses expressed in octal were not correctly interpreted. The result was that an attacker was able to bypass input validation rules that restricted IP addresses to specific subnets.  The vulnerability was documented in (this list is unlikely to be complete): Node.js netmask […]

Read More

[BleepingComputer] Microsoft’s Windows Cloud PC service almost here – What we know so far

In addition to Windows 11, Microsoft has been secretly working on a new Windows PC experience called ‘Cloud PC’ that allows business customers to run virtualized desktops in the cloud. […] Source: Read More (BleepingComputer)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.