How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

November 6, 2014
No Comment

“Computers housing the world’s most sensitive data are usually ‘air-gapped’ or isolated from the internet. They’re also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too. Sometimes, workers are not even allowed to bring mobile phones within range of the computers. All of this is done to keep important […]

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.

Other posts by