Home How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data
 

Keywords :   


How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

2014-11-03 12:46:13| Wireless - Topix.net

Computers housing the world's most sensitive data are usually "air-gapped" or isolated from the internet. They're also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too.

Tags: data mobile radio phones

Category:Telecommunications

Latest from this category

All news

»
23.11
23.11 85
23.11DANCEWITHDRAGON2 811
23.11 N5000VSE
23.11EZY POWER EDIT6
23.11RR4
23.1126.5 HG
23.11VISSLA
More »