je.st
news
How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data
2014-11-03 12:46:13| Wireless - Topix.net
Computers housing the world's most sensitive data are usually "air-gapped" or isolated from the internet. They're also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too.
Tags: data
mobile
radio
phones
Category:Telecommunications
Latest from this category |
All news |
||||||||||||||||||||
|
|