{"id":3327,"date":"2017-02-26T15:54:03","date_gmt":"2017-02-26T20:54:03","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/?p=3327"},"modified":"2017-02-26T15:54:03","modified_gmt":"2017-02-26T20:54:03","slug":"malware-lets-a-drone-steal-data-by-watching-a-computers-blinking-led","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/2017\/02\/26\/malware-lets-a-drone-steal-data-by-watching-a-computers-blinking-led\/","title":{"rendered":"Malware Lets a Drone Steal Data by Watching a Computer\u2019s Blinking LED"},"content":{"rendered":"<p>Researchers at Ben-Gurion University in Israel have developed a way to steal data off of someone\u2019s hard drive by infecting the desired computer with malware and reading data through the blinking LED light that indicates hard drive activity. In their testing, researchers used a drone camera that would fly to the window of the office where the computer was infected. Once at the window, the drone can capture the blinking LEDs, which can blink up to 6,000 times per second. This allows the desired hacker to transmit data very fast over a long distance. Being able to infiltrate a system that is not on the internet is a major concern for highly sensitive systems that utilize the \u201cair gap.\u201d The \u201cair gap\u201d is sometimes seen as an impenetrable defense against highly sensitive systems which are not connected to the internet. By using the computer\u2019s LED light it has the potential for hackers to use a stealthier, higher-bandwidth and longer distance method to infiltrating an air-gapped computer. The researchers believe that the easiest way to circumvent this is by taping the LED light or by keeping highly sensitive systems away from windows.<\/p>\n<p>Article &#8211; https:\/\/www.wired.com\/2017\/02\/malware-sends-stolen-data-drone-just-pcs-blinking-led\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at Ben-Gurion University in Israel have developed a way to steal data off of someone\u2019s hard drive by infecting the desired computer with malware and reading data through the blinking LED light that indicates hard drive activity. In their testing, researchers used a drone camera that would fly to the window of the office [&hellip;]<\/p>\n","protected":false},"author":9410,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[715997],"tags":[],"class_list":{"0":"post-3327","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-06-project-portfolio-management","7":"entry"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8j0Bl-RF","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/users\/9410"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/comments?post=3327"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3327\/revisions"}],"predecessor-version":[{"id":3328,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/posts\/3327\/revisions\/3328"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/media?parent=3327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/categories?post=3327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5212sec001sp2017\/wp-json\/wp\/v2\/tags?post=3327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}