A researcher from the Ben-Gurion University of the Negev in Israel has shown how a threat actor could stealthily exfiltrate data from air-gapped computers using ultrasonic tones and smartphone gyroscopes.
- Posted on
- By SecurityIT
- In Data Protection, Endpoint Security, Mobile Security, NEWS & INDUSTRY


