Highly Complex USB Trojan Targeting Air-Gapped Systems Discovered

Highly Complex USB Trojan Targeting Air-Gapped Systems Discovered

USB Thief trojan uses encryption to hide its actions

Emitting Radio Waves from a Computer with No Radio-Transmitting Hardware

Emitting Radio Waves from a Computer with No Radio-Transmitting Hardware

New program transmits radio waves from computers without radio transmitting hardware, could be used for data theft