Following our recent disclosure on how to breach air gap security with a simple mobile phone and RF emitted from the air-gapped computer we wanted to provide some overview on the topic. - See more at: http://cyber.bgu.ac.il/blog/can-we-rely-air-gap-secure-our-critical-systems#sthash.XXzMC6hz.dpuf
↧