Four methods hackers use to steal data from air-gapped computers

Discussion in 'other security issues & news' started by ronjor, Nov 20, 2017.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    164,083
    Location:
    Texas
  2. Keatah

    Keatah Registered Member

    Joined:
    Jan 13, 2011
    Posts:
    1,029
    Still need to get additional software onto the target. And you have to set up monitoring..
     
  3. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    The article doesn't mention the most obvious method, compromised firmware in file transfer devices such as USB thumbdrives and external hard drives.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.