Donating old technology is a great practice - rather than disposing of devices simply because you don't need them, donating lets those devices go to those who will still benefit from their use. However, it's important to securely wipe devices before donating to ensure that your personal data stays private.
This holiday season you might be receiving a voice-controlled gadget – a voice controlled TV, a phone, or even an Amazon Echo. The convenience of this is obvious. But what about the downside? In order for the device to respond to your command – even its wake up command – it must, by definition, be listening. And it could be listening – and recording – a business-related conversation.
This year purchasing through mobile services like Apple Pay, Android Pay, and Samsung Pay may actually be safer than that microchip credit card you just got in the mail.
Since heat is a natural byproduct of digital computation, why not use this electromagnetic emanation as a bypass for air-gap systems?
Researches from the Singapore University of Technology and Design have developed a clever method to steal data from wireless printer networks that were otherwise assumed secure.
Beware USBs promising a quick recharge of your mobile device; they might also be leeching data as well.
According to new research, air gapped systems can be defeated by low-frequency signals from the devices themselves and inexpensive mobile phones.
Manipulating sound waves to open a vector for data exfiltration seems like the stuff of science fiction - but based on recent research, the technique is quite plausible.