Canada Cyber

Thursday, October 30, 2014

How to leak sensitive data from an isolated computer air-gap to a near...

iframe width 480 height 270 src https://www.youtube.com/embed/2OzTWiGl1rM frameborder 0 allowfullscreen> /iframe>
Posted by CanadaCyber www.canadacyber.com at 5:34 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
CanadaCyber www.canadacyber.com
View my complete profile

Blog Archive

  • ►  2022 (2)
    • ►  September (1)
    • ►  August (1)
  • ►  2021 (3)
    • ►  December (3)
  • ►  2020 (2)
    • ►  May (1)
    • ►  April (1)
  • ►  2019 (1)
    • ►  May (1)
  • ►  2018 (1)
    • ►  December (1)
  • ►  2017 (2)
    • ►  September (1)
    • ►  January (1)
  • ►  2016 (6)
    • ►  August (2)
    • ►  March (3)
    • ►  February (1)
  • ►  2015 (13)
    • ►  December (3)
    • ►  August (1)
    • ►  July (1)
    • ►  May (2)
    • ►  April (1)
    • ►  February (3)
    • ►  January (2)
  • ▼  2014 (39)
    • ►  December (2)
    • ►  November (5)
    • ▼  October (4)
      • The dangers of opening suspicious emails: Crowti r...
      • How to leak sensitive data from an isolated comput...
      • Ransomware US-CERT ALERT
      • Ethics in a Cyber world
    • ►  September (8)
    • ►  August (7)
    • ►  July (9)
    • ►  May (1)
    • ►  March (2)
    • ►  February (1)
Simple theme. Powered by Blogger.