In the News
WIRED |19.5.2020 | Web Giants Scrambled to Head Off a Dangerous DDoS Technique
FOX NEWS |28.5.2020 |Israeli researchers helped thwart potentially massive cyberattack, study shows
APNIC |21.5.2020 | NXNSAttack: upgrade resolvers to stop new kind of random subdomain attack
Taylor & Francis | 29.6.2020 | Between privacy and security: the factors that drive intentions to use cyber-security applications
Heliyon | 2.2.2020 | Selectivity in posting on social networks: the role of privacy concerns, socialcapital, and technical literacy
Forbes | 11.4.2019 | Flaws in WPA3 Wi-Fi Standard Allow Attackers To Crack Passwords And View Traffic
ZDNet | 9.3.2019 | New TLS encryption-busting attack also impacts the newer TLS 1.3
DailyMail | 29.8.2018 | “Hackers can spy on your computer screen just by listening to your webcam's microphone, experts warn”
American Bar Association Journal | 1.12.2018 | “What do AI, blockchain and GDPR mean for cybersecurity?”
The Cornell Daily Sun | 30.8.2018 | “Computer Screen Noise Can Result In Data Leaks, Finds Cornell Tech Researcher’s Report”
Ars Technica | 23.8.2018 | “Researchers find way to spy on remote screens - through the webcam mic”
The Register | 1.12.2018 | “Warning: Malware, rogue users can spy on some apps’ HTTPS crypto – by whipping them with a CAT o’ nine TLS“
כלכליסט | רפאל קאהאן | 12.4.2017 | מחקר ישראלי: כך האקר יכול לדעת באיזה סרט אתם צופים בלי לפרוץ למחשב
IEEE Spectrum | Amy Nordrum | 5.4.2016 | 5 Ways Cyber Experts Think the FBI Might Have Hacked the San Bernardino iPhone
IBTimes | Agamoni Ghosh | 4.3.2016 | Android and iOS phones under threat as secret crypto keys can be stolen for Bitcoin Wallets and Apple Pay
The Register | John Leyden | 17.3.2016 | Infosec bods pop mobile money crypto by ‘sniffing’ e-mag radiation
Ars Technica | Dan Goodin | 3.3.2016 | New attack steals secret crypto keys from Android and iOS phones
01 net | Gilbert Kallenborn | 4.3.2016 | On peut pirater les smartphones iOS ou Android à cause de leurs fuites électromagnétiques
IEEE Spectrum | Morgen Peck | 2.12.2016 | The crazy security behind the birth of Zcash, the inside story
Vesti Finance | Svytoslav Bocharof | Пита – главное оружие израильских хакеров” (“Pita – The main weapon of the Israeli hackers”)
כלכליסט | רפאל קאהאן | 21.6.2016| החוקרים שפורצים הצפנה בנגיעת יד
Business Insider | James Cook | 23.6.2015 | Security researchers have figured out how to hack into laptops using pita bread and a radio
דניאל שמיל | 23.2.2014 | מי ניתק את הבלמים? האקרים מגיעים למכונית שלכם |The Marker
Phys.org | Bob Yirka | 19.12.2013| Research trio crack RSA encryption keys by listening to computer noise
Tom’s Guide | Jill Scharr | Computer Sounds Give Up Secret Information
Softpedia | Eduard Kovacs |19.12.2013 | Full 4096-Bit RSA Keys Extracted by Listening to the Sound Made by Computers
Gazeta.pl | Robert Kędzierski |– #8 site in Poland | 20.12.2013 | Podsłuchali procesor i… odczytali szyfrowaną wiadomość. Zwykłą komórką !
Channel 4 News – Geoff White on Technology | Geoff White| 20.12.2013 | The hacker’s latest weapon: a simple microphone”
Daily Mail | 19.12.13| Damien Gayle, Victoria Woollaston | How your computer’s secrets could be cracked by a smartphone just LISTENING to it as it runs its encryption software
The Register |John Leyden | 19.12.2013 | Code-busters lift RSA keys simply by listening to the noises a computer makes
Forbes | Tim Worstall | 21.12.2013 | Researchers Break RSA 4096 Encryption With Just A Microphone And A Couple Of Emails
Ars Technica | Dan Goodin | 19.12.2013| New attack steals e-mail decryption keys by capturing computer sounds
PCWorld / Computerworld |Mark Hachman | 19.12.2013 | Listen up: RSA keys snatched by recording CPU sounds with a phone
ExtremeTech | Sebastian Anthony | 18.12.2013 | Researchers crack the world’s toughest encryption by listening to the tiny sounds made by your computer’s CPU
NBC News |Devin Coldewey | 19.12.2013 | The sound of secrets: New hacking technique infiltrates by hearing — or touch
Le Monde | Jacques Cheminat avec IDG NS | Déchiffrer un message crypté en écoutant le son du processeur