Re: ARLA/CLUSTER: Vídeo demonstra como aceder a um vulgar telemóvel através da rede GSM
Carlos Pinheiro
karlus.pinheiro gmail.com
Quinta-Feira, 30 de Julho de 2015 - 16:10:39 WEST
Caro colega, não tem nada que pedir desculpa !
"errare humanum est" :-)
Eu é que agradeço a quantidade de artigos interessantes a que tenho acesso
graças a colegas como o CT1FBF e outros !
73
CP
2015-07-30 16:02 GMT+01:00 João Costa > CT1FBF <ct1fbf gmail.com>:
> Prezado Colega Carlos,
>
> Tem toda a razão e peço desculpa pelo meu erro.
>
> João Costa (CT1FBF)
>
> 2015-07-30 15:29 GMT+01:00 Carlos Pinheiro <karlus.pinheiro gmail.com>:
> > Caro João Costa,
> >
> > Acho que o tÃtulo não está muito correcto, pois lendo o artigo conclui-se
> > que a ideia é aceder aos dados de um PC através de um simples telemóvel e
> > não " aceder a um vulgar telemóvel através da rede GSM ".
> >
> >
> > 73 de CT1PT
> > CP
> >
> >
> > 2015-07-30 12:25 GMT+01:00 João Costa > CT1FBF <ct1fbf gmail.com>:
> >>
> >> Researchers hack air-gapped computer with simple cell phone
> >>
> >> THE MOST SENSITIVE work environments, like nuclear power plants, demand
> >> the strictest security. Usually this is achieved by air-gapping
> computers
> >> from the Internet and preventing workers from inserting USB sticks into
> >> computers. When the work is classified or involves sensitive trade
> secrets,
> >> companies often also institute strict rules against bringing smartphones
> >> into the workspace, as these could easily be turned into unwitting
> listening
> >> devices.
> >>
> >> But researchers in Israel have devised a new method for stealing data
> that
> >> bypasses all of these protections—using the GSM network, electromagnetic
> >> waves and a basic low-end mobile phone. The researchers are calling the
> >> finding a “breakthrough†in extracting data from air-gapped systems and
> say
> >> it serves as a warning to defense companies and others that they need to
> >> immediately “change their security guidelines and prohibit employees and
> >> visitors from bringing devices capable of intercepting RF signals,†says
> >> Yuval Elovici, director of the Cyber Security Research Center at
> Ben-Gurion
> >> University of the Negev, where the research was done.
> >>
> >> The attack requires both the targeted computer and the mobile phone to
> >> have malware installed on them, but once this is done the attack
> exploits
> >> the natural capabilities of each device to exfiltrate data. Computers,
> for
> >> example, naturally emit electromagnetic radiation during their normal
> >> operation, and cell phones by their nature are “agile receivers†of such
> >> signals. These two factors combined create an “invitation for attackers
> >> seeking to exfiltrate data over a covert channel,†the researchers
> write in
> >> a paper about their findings.
> >>
> >> The research builds on a previous attack the academics devised last year
> >> using a smartphone to wirelessly extract data from air-gapped
> computers. But
> >> that attack involved radio signals generated by a computer’s video card
> that
> >> get picked up by the FM radio receiver in a smartphone.
> >>
> >> Read the full story at:
> >>
> >>
> http://www.wired.com/2015/07/researchers-hack-air-gapped-computer-simple-cell-phone/
> >>
> >>
> >> _______________________________________________
> >> CLUSTER mailing list
> >> CLUSTER radio-amador.net
> >> http://radio-amador.net/cgi-bin/mailman/listinfo/cluster
> >>
> >
> >
> >
> > --
> > Carlos Pinheiro
> >
> > _______________________________________________
> > CLUSTER mailing list
> > CLUSTER radio-amador.net
> > http://radio-amador.net/cgi-bin/mailman/listinfo/cluster
> >
>
>
> _______________________________________________
> CLUSTER mailing list
> CLUSTER radio-amador.net
> http://radio-amador.net/cgi-bin/mailman/listinfo/cluster
>
>
--
Carlos Pinheiro
-------------- próxima parte ----------
Um anexo em HTML foi limpo...
URL: http://radio-amador.net/pipermail/cluster/attachments/20150730/fb5be11f/attachment.htm
Mais informações acerca da lista CLUSTER