This is a Israel news story, published by Dark Reading, that relates primarily to Mordechai Guri news.
For more Israel news, you can click here:
more Israel newsFor more Mordechai Guri news, you can click here:
more Mordechai Guri newsFor more Us crime, violence, terrorism & cybercrime news, you can click here:
more Us crime, violence, terrorism & cybercrime newsFor more news from Dark Reading, you can click here:
more news from Dark ReadingOtherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best politics news, business news, entertainment news, and much more. If you like this article about Us crime, violence, terrorism & cybercrime, you might also like this article about
covert channels. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest Covert Channel Attacks news, covert channel attack method news, news about Us crime, violence, terrorism & cybercrime, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
covert channel attackDark Reading
•62% Informative
A newly devised covert channel attack method could undermine air gaps at highly sensitive organizations.
Israel 's Mordechai Guri of Ben-Gurion University has long researched ways of crossing air gaps with sound waves.
His latest attack scenario, "Pixhell," enables data theft using sounds produced by specially generated, rapidly shifting bitmap patterns on an LCD screen.
The greater distance between communicating computers, the more difficult it is to exploit covert channels.
The operative idea is signal-to-noise ratio ( SNR ) How much noise does one have to generate to make a covert channel attack impractical? Whether such science-fiction-level defenses are warranted will depend on the organization at risk.
VR Score
64
Informative language
64
Neutral language
26
Article tone
informal
Language
English
Language complexity
55
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
long-living
External references
no external sources
Source diversity
no sources
Affiliate links
no affiliate links