{"id":106099,"date":"2020-04-26T23:06:26","date_gmt":"2020-04-27T06:06:26","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2020\/04\/cyberattack-can-steal-data-via-cooling-fan-vibrations"},"modified":"2020-04-26T23:06:26","modified_gmt":"2020-04-27T06:06:26","slug":"cyberattack-can-steal-data-via-cooling-fan-vibrations","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2020\/04\/cyberattack-can-steal-data-via-cooling-fan-vibrations","title":{"rendered":"Cyberattack can steal data via cooling fan vibrations"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/XGD343nq1dg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Israeli researchers uncovered a novel way that hackers could steal sensitive data from a highly secured computer: by tapping into the vibrations from a cooling system fan.<\/p>\n<p>Lead cyber-security researcher Mordechai Guri at Ben-Gurion University of the Negev said data encoded by hackers into fan vibrations could be transmitted to a smartphone placed in the vicinity of the targeted <a href=\"https:\/\/techxplore.com\/tags\/computer\/\" rel=\"tag\" class=\"\">computer<\/a>.<\/p>\n<p>\u201cWe observe that computers vibrate at a frequency correlated to the rotation speed of their internal fans,\u201d Guri said. Malware can control computer vibrations by manipulating internal fan speeds, he explained. \u201cThese inaudible vibrations affect the entire structure on which the computer is placed.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Israeli researchers uncovered a novel way that hackers could steal sensitive data from a highly secured computer: by tapping into the vibrations from a cooling system fan. Lead cyber-security researcher Mordechai Guri at Ben-Gurion University of the Negev said data encoded by hackers into fan vibrations could be transmitted to a smartphone placed in the [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1512],"tags":[],"class_list":["post-106099","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-mobile-phones"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/106099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=106099"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/106099\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=106099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=106099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=106099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}