Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How cellphones steal from air-gapped computers

Patrick Nelson | Nov. 12, 2014
Sensitive data can be leaked from isolated, non-networked computers using radio waves, according to new security research.

Collecting cellphones
Ben P., in his post, adds that he thinks cellphones should be collected at the door, as is indeed common in some secure locations.

My humble advice would be that even if the organization collects phones before visitors or workers enter the secure facility, just make sure, for now at least, that the depository is over seven meters from the computers. Another argument against BYOD, perhaps?

Source: Network World


Previous Page  1  2 

Sign up for Computerworld eNewsletters.