Re: ARLA/CLUSTER: Vídeo demonstra como aceder a um vulgar telemóvel através da rede GSM

João Costa > CT1FBF ct1fbf gmail.com
Quinta-Feira, 30 de Julho de 2015 - 16:02:34 WEST


 Prezado Colega Carlos,

Tem toda a razão e peço desculpa pelo meu erro.

João Costa (CT1FBF)

2015-07-30 15:29 GMT+01:00 Carlos Pinheiro <karlus.pinheiro  gmail.com>:
> Caro João Costa,
>
> Acho que o título não está muito correcto, pois lendo o artigo conclui-se
> que a ideia é aceder aos dados de um PC através de um simples telemóvel e
> não " aceder a um vulgar telemóvel através da rede GSM ".
>
>
> 73 de CT1PT
> CP
>
>
> 2015-07-30 12:25 GMT+01:00 João Costa > CT1FBF <ct1fbf  gmail.com>:
>>
>> Researchers hack air-gapped computer with simple cell phone
>>
>> THE MOST SENSITIVE work environments, like nuclear power plants, demand
>> the strictest security. Usually this is achieved by air-gapping computers
>> from the Internet and preventing workers from inserting USB sticks into
>> computers. When the work is classified or involves sensitive trade secrets,
>> companies often also institute strict rules against bringing smartphones
>> into the workspace, as these could easily be turned into unwitting listening
>> devices.
>>
>> But researchers in Israel have devised a new method for stealing data that
>> bypasses all of these protections—using the GSM network, electromagnetic
>> waves and a basic low-end mobile phone. The researchers are calling the
>> finding a “breakthrough” in extracting data from air-gapped systems and say
>> it serves as a warning to defense companies and others that they need to
>> immediately “change their security guidelines and prohibit employees and
>> visitors from bringing devices capable of intercepting RF signals,” says
>> Yuval Elovici, director of the Cyber Security Research Center at Ben-Gurion
>> University of the Negev, where the research was done.
>>
>> The attack requires both the targeted computer and the mobile phone to
>> have malware installed on them, but once this is done the attack exploits
>> the natural capabilities of each device to exfiltrate data. Computers, for
>> example, naturally emit electromagnetic radiation during their normal
>> operation, and cell phones by their nature are “agile receivers” of such
>> signals. These two factors combined create an “invitation for attackers
>> seeking to exfiltrate data over a covert channel,” the researchers write in
>> a paper about their findings.
>>
>> The research builds on a previous attack the academics devised last year
>> using a smartphone to wirelessly extract data from air-gapped computers. But
>> that attack involved radio signals generated by a computer’s video card that
>> get picked up by the FM radio receiver in a smartphone.
>>
>> Read the full story at:
>>
>> http://www.wired.com/2015/07/researchers-hack-air-gapped-computer-simple-cell-phone/
>>
>>
>> _______________________________________________
>> CLUSTER mailing list
>> CLUSTER  radio-amador.net
>> http://radio-amador.net/cgi-bin/mailman/listinfo/cluster
>>
>
>
>
> --
> Carlos Pinheiro
>
> _______________________________________________
> CLUSTER mailing list
> CLUSTER  radio-amador.net
> http://radio-amador.net/cgi-bin/mailman/listinfo/cluster
>



Mais informações acerca da lista CLUSTER