awful.systems
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 year ago

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers

thehackernews.com

external-link
message-square
2
link
fedilink
28
external-link

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers

thehackernews.com

Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 year ago
message-square
2
link
fedilink
New PIXHELL Attack Exploits LCD Screen Noise to Exfiltrate Data from Air-Gapped Computers
thehackernews.com
external-link
Discover PIXHELL, a new side-channel attack exploiting screen-generated noise to breach air-gapped computers and exfiltrate sensitive data.
alert-triangle
You must log in or # to comment.
  • dsilverz@thelemmy.club
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    1 year ago

    deleted by creator

    • recursive_recursion [they/them]@programming.dev
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      just curious but from your experience is Displayport just as bad or is it worse than HDMI for this exploit?

      • dsilverz@thelemmy.club
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        1 year ago

        deleted by creator

  • PoTayToes@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    I’m sorry, but even if this isn’t new, I find it completely insane. Like, mind-blowing. Damn.

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 45 users / day
  • 206 users / week
  • 1.45K users / month
  • 3.58K users / 6 months
  • 8 local subscribers
  • 8.89K subscribers
  • 3.9K Posts
  • 5.05K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.12
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org