Channel Avatar

Cyber Security Labs @ Ben Gurion University @UCjCSvlOcENVup0Xeiim1u0g@youtube.com

7.1K subscribers - no pronouns :c

More from this channel (soon)


03:01
Video-Based Cryptanalysis
01:13
COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!
00:42
ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDs
00:42
GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes
01:02
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
02:44
The Little Seal Bug
00:59
LANTENNA ATTACK: Leaking Data from Air-Gapped Networks via Ethernet Cables
02:58
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED
01:16
Air-Fi: Generating Covert Wi-Fi Signals from Air-Gapped Computers
01:59
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split Second Phantom Attacks
03:34
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations
00:53
AIR-TRACK: Cross-Device Tracking Over Air-Gaps Through Power Supply
01:22
POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers
00:46
AiR ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs
04:04
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness
04:13
Phantom of the ADAS: Phantom Attacks on Driving Assistance Systems
00:35
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs
01:08
MobilBye
03:27
Injecting and Removing Cancer from CT Scans
01:58
DOS Delivery
01:38
Follow Who?
00:58
Drones' Cryptanalysis - Smashing cryptography with a Flicker
02:30
Piping Botnet - Attacking Smart Irrigation Systems
01:14
BeatCoin 2: Leaking bitcoin private key from air-gapped wallet
01:07
BeatCoin: Leaking bitcoin's private keys from air-gapped wallets
01:15
MOSQUITO: Jump air-gaps via speaker-to-speaker communication
00:34
MOSQUITO earbuds: Jumping air-gaps via speaker-to-speaker communication
01:00
MAGNETO: Air-Gap Magnetic Keylogger
01:53
ODINI: Escaping data from Faraday-caged Air-Gapped computers
02:34
Game Of Drones - Detecting Streamed POI from Encrypted FPV Channel
01:36
leaking data via security cameras
00:50
hidden communication via security cameras
02:59
xLED: Covert Data Exfiltrartion via Router LEDs
00:53
Infiltrating a command to an air-gapped network by hijacking smart bulb via a scanner
02:30
Infiltration of command to an air-gapped network using a laser installed in a drone via a scanner
01:30
LED-it-GO. Jumping the Air-Gap with a small HardDrive LED
03:57
Handwritten Signature Verification Using Hand-Worn Devices
02:04
"SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit"
01:39
USBee: Jumping the air-gap with USB
01:00
DiskFiltration: Data Exfiltration from Air-Gapped Computers
01:20
Fansmitter: Leaking Data from Speakerless Computers (clip #2)
01:17
Fansmitter: Leaking Data from Air-Gap Computers (clip #1)
01:25
A Vulnerability in Google Chrome DRM Lets Attackers Steal Protected Content Easily
01:09
GSMem Breaking The Air-Gap
01:44
BitWhisper - Jumping the Air-Gap with Heat
02:00
How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper
01:07
Active VPN Bypass on Android KitKat - Cyber Security Labs @ BGU
01:10
VPN Related Vulnerability Discovered on an Android device