Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)aaa
published in(发表于) 2014/8/24 8:18:55
There are pictures and the truth: touch computers, steal data,

There are pictures and the truth: touch your computer, steals data-hacking, vulnerability-IT news
There are pictures and the truth: touch computers, steal data

Traditionally, hackers to steal data on the computer or server, must first of all by a wired, Wi-Fi or a USB memory stick and other tools, and establish a connection to the target system. On the popular American TV show prison break, and once appeared in without touching the data in the case of stealing electronic equipment, but it is the writer's imagination.

However, according to United States technology news website Engadget reported on August 23, Israel University researchers recently successfully implements a "theft of data" technology, you only need to touch my computer, you can use computers to small voltage changes, reverse-hacking, password data.

Traditionally, the hacking system, first of all to find other loopholes in the software, and then exploit through outgoing data communication connections. This process is time-consuming.

Recently, Israel a team of researchers at Tel Aviv University, successfully developed a new technology, the future could lead to a more simple approach of the contactless transfer of data.

In this project, researchers used hand tools or other conductive contact computer hardware, researchers wear signal digital device so that they are acquiring computer small voltage change.

Allegedly, some cryptographic algorithms for high-strength encryption (such as 4,096-bit RSA encryption) process, the computer will win some changes in voltage. In this way, voltage data obtained through touch, researchers were able to follow it, crack passwords.

According to reports, the LAN cable and CATV cable, the researchers also by voltage data, crack the password and other information.

However, real-world hacking to achieve feel computers and steal data, there is a very long time.

It was reported that in the aforementioned case studies at Tel Aviv University, studies using the GnuPG encryption software work voltage the leakage of information, at present, this vulnerability has been released patches.

However, electronic equipment, including computers, servers, nature is not an insulator, also do not live in a "Faraday cage" (can block external electrical field interference). Therefore, in the context of development of science and technology of one day, hackers can get close to electronic devices, it is possible via electronic devices surrounding electromagnetic information, stolen data.




If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759