<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: External Speaker attack in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/External-Speaker-attack/m-p/57777#M3862</link>
    <description>&lt;P&gt;Some researchers at Ben Gurion University have been thinking this way for years. Here's one from a few years ago about using the LED to exfiltrate data from an air-gapped computer.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.wired.com/2017/02/malware-sends-stolen-data-drone-just-pcs-blinking-led/" target="_blank"&gt;https://www.wired.com/2017/02/malware-sends-stolen-data-drone-just-pcs-blinking-led/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It shows you how valuable creativity is to security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Mar 2023 19:24:32 GMT</pubDate>
    <dc:creator>JoePete</dc:creator>
    <dc:date>2023-03-14T19:24:32Z</dc:date>
    <item>
      <title>External Speaker attack</title>
      <link>https://community.isc2.org/t5/Tech-Talk/External-Speaker-attack/m-p/57755#M3859</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have all heard of technical countermeasures, well here is an interesting attack - with an external speaker.&amp;nbsp; Now imagine what the same attack would like using Quantum Computers?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/casper-attack-steals-data-using-air-gapped-computers-internal-speaker/#.ZA7HRIenHVk.linkedin" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/casper-attack-steals-data-using-air-gapped-computers-internal-speaker/#.ZA7HRIenHVk.linkedin&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:28:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/External-Speaker-attack/m-p/57755#M3859</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: External Speaker attack</title>
      <link>https://community.isc2.org/t5/Tech-Talk/External-Speaker-attack/m-p/57777#M3862</link>
      <description>&lt;P&gt;Some researchers at Ben Gurion University have been thinking this way for years. Here's one from a few years ago about using the LED to exfiltrate data from an air-gapped computer.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.wired.com/2017/02/malware-sends-stolen-data-drone-just-pcs-blinking-led/" target="_blank"&gt;https://www.wired.com/2017/02/malware-sends-stolen-data-drone-just-pcs-blinking-led/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It shows you how valuable creativity is to security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 19:24:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/External-Speaker-attack/m-p/57777#M3862</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2023-03-14T19:24:32Z</dc:date>
    </item>
  </channel>
</rss>

