{"id":139418,"date":"2022-05-16T13:02:28","date_gmt":"2022-05-16T18:02:28","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/05\/eavesdroppers-can-hack-6g-frequency-with-diy-metasurface"},"modified":"2022-05-16T13:02:28","modified_gmt":"2022-05-16T18:02:28","slug":"eavesdroppers-can-hack-6g-frequency-with-diy-metasurface","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/05\/eavesdroppers-can-hack-6g-frequency-with-diy-metasurface","title":{"rendered":"Eavesdroppers can hack 6G frequency with DIY metasurface"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/eavesdroppers-can-hack-6g-frequency-with-diy-metasurface2.jpg\"><\/a><\/p>\n<p>Crafty hackers can make a tool to eavesdrop on some 6G wireless signals in as little as five minutes using office paper, an inkjet printer, a metallic foil transfer and a laminator.<\/p>\n<p>The wireless security hack was discovered by engineering researchers from Rice University and Brown University, who will present their findings and demonstrate the attack this week in San Antonio at ACM WiSec 2022, the Association for Computing Machinery\u2019s annual conference on security and privacy in wireless and mobile networks.<\/p>\n<p>\u201cAwareness of a future threat is the first step to counter that threat,\u201d said study co-author Edward Knightly, Rice\u2019s Sheafor-Lindsay Professor of Electrical and Computer Engineering. \u201cThe frequencies that are vulnerable to this attack aren\u2019t in use yet, but they are coming and we need to be prepared.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crafty hackers can make a tool to eavesdrop on some 6G wireless signals in as little as five minutes using office paper, an inkjet printer, a metallic foil transfer and a laminator. The wireless security hack was discovered by engineering researchers from Rice University and Brown University, who will present their findings and demonstrate the [\u2026]<\/p>\n","protected":false},"author":661,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,38,418],"tags":[],"class_list":["post-139418","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-engineering","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/139418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/661"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=139418"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/139418\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=139418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=139418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=139418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}