
Security Flaw Exploits Air-Gapped Computers Using Smartwatches - Jordan News
In a groundbreaking and unconventional breach, a research team led by Mordechai Guri has unveiled a novel security vulnerability capable of leaking data from air-gapped computer systems—those physically isolated from any network—through smartwatches using inaudible ultrasonic signals. اضافة اعلان How SmartAttack Works The attack method, dubbed SmartAttack, relies on the pre-installation of malicious software on the target computer. This malware encodes sensitive data into ultrasonic signals using a modulation technique known as Binary Frequency Shift Keying (B-FSK): 18.5 kHz frequency = binary '0' 19.5 kHz frequency = binary '1' These signals are emitted through the computer's speakers and picked up by the microphones of nearby smartwatches, whether intentionally placed or previously compromised. Specialized apps on the smartwatch decode the signals into digital information, which is then transmitted externally via Wi-Fi, Bluetooth, or cellular networks once the watch wearer leaves the secure area. According to the research—set to be presented at IEEE COMPSAC 2025—the most likely entry points for such attacks include insider threats, such as disgruntled employees, or supply chain compromises that inject malware early in the device lifecycle. Why This Attack Is Unique Unlike traditional attacks that rely on network vulnerabilities, SmartAttack uses physical hardware components (speakers and smartwatch microphones) to establish a covert communication channel, rendering conventional cybersecurity systems like firewalls and intrusion detection tools ineffective. Limitations and Engineering Constraints While the concept is innovative, its real-world execution faces several challenges: Limited microphone sensitivity in smartwatches makes ultrasonic reception more susceptible to noise and interference. Effective range is constrained to 6–9 meters, and Data transfer speed is low—about 50 bits per second—making the exfiltration of large volumes of data slow and cumbersome. Signal quality depends heavily on watch orientation and line-of-sight to the computer. Despite these constraints, the attack's significance lies in debunking the myth of complete air-gap immunity, building on Guri's prior work that includes data leaks via LCD light emissions, electromagnetic noise from cables, fan vibrations, and power supply fluctuations. Recommended Countermeasures To defend against such unconventional threats, researchers advise the following: Ban smartwatches and wearable tech from high-security environments. Disable or physically disconnect speakers in air-gapped systems. Deploy ultrasonic jammers to disrupt unauthorized acoustic transmissions. Implement audio activity monitoring to flag unusual speaker behavior. Use physical acoustic insulation to block ultrasonic signal transmission. Final Thoughts
Though SmartAttack remains complex and difficult to carry out at scale, it serves as a critical wake-up call for cybersecurity leaders to rethink their defense strategies. Traditional security paradigms are no longer sufficient—next-generation threats may come from hardware behaviors, not just network breaches. As air-gapped systems continue to be targeted in novel ways, a proactive, multidisciplinary approach is vital to safeguarding sensitive environments.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Jordan News
16 hours ago
- Jordan News
Security Flaw Exploits Air-Gapped Computers Using Smartwatches - Jordan News
In a groundbreaking and unconventional breach, a research team led by Mordechai Guri has unveiled a novel security vulnerability capable of leaking data from air-gapped computer systems—those physically isolated from any network—through smartwatches using inaudible ultrasonic signals. اضافة اعلان How SmartAttack Works The attack method, dubbed SmartAttack, relies on the pre-installation of malicious software on the target computer. This malware encodes sensitive data into ultrasonic signals using a modulation technique known as Binary Frequency Shift Keying (B-FSK): 18.5 kHz frequency = binary '0' 19.5 kHz frequency = binary '1' These signals are emitted through the computer's speakers and picked up by the microphones of nearby smartwatches, whether intentionally placed or previously compromised. Specialized apps on the smartwatch decode the signals into digital information, which is then transmitted externally via Wi-Fi, Bluetooth, or cellular networks once the watch wearer leaves the secure area. According to the research—set to be presented at IEEE COMPSAC 2025—the most likely entry points for such attacks include insider threats, such as disgruntled employees, or supply chain compromises that inject malware early in the device lifecycle. Why This Attack Is Unique Unlike traditional attacks that rely on network vulnerabilities, SmartAttack uses physical hardware components (speakers and smartwatch microphones) to establish a covert communication channel, rendering conventional cybersecurity systems like firewalls and intrusion detection tools ineffective. Limitations and Engineering Constraints While the concept is innovative, its real-world execution faces several challenges: Limited microphone sensitivity in smartwatches makes ultrasonic reception more susceptible to noise and interference. Effective range is constrained to 6–9 meters, and Data transfer speed is low—about 50 bits per second—making the exfiltration of large volumes of data slow and cumbersome. Signal quality depends heavily on watch orientation and line-of-sight to the computer. Despite these constraints, the attack's significance lies in debunking the myth of complete air-gap immunity, building on Guri's prior work that includes data leaks via LCD light emissions, electromagnetic noise from cables, fan vibrations, and power supply fluctuations. Recommended Countermeasures To defend against such unconventional threats, researchers advise the following: Ban smartwatches and wearable tech from high-security environments. Disable or physically disconnect speakers in air-gapped systems. Deploy ultrasonic jammers to disrupt unauthorized acoustic transmissions. Implement audio activity monitoring to flag unusual speaker behavior. Use physical acoustic insulation to block ultrasonic signal transmission. Final Thoughts Though SmartAttack remains complex and difficult to carry out at scale, it serves as a critical wake-up call for cybersecurity leaders to rethink their defense strategies. Traditional security paradigms are no longer sufficient—next-generation threats may come from hardware behaviors, not just network breaches. As air-gapped systems continue to be targeted in novel ways, a proactive, multidisciplinary approach is vital to safeguarding sensitive environments.


Saraha News
13-05-2025
- Saraha News
Zain Provides Integrated Telecom Solutions for Jordan Gate Towers Project
In line with its strategic role in advancing the Kingdom's digital infrastructure and providing state-of-the-art telecom solutions to major national projects, Zain Jordan has signed a strategic agreement with 'Jordan Gate' – developer of the iconic Sixth Circle Towers – to deliver comprehensive and integrated telecommunications services across the project's residential and commercial components. The agreement was signed at the headquarters of Jordan Gate, by Zain Jordan CEO Fahad Al-Jasim and Chairman of the Board at Jordan Gate, Abdul Mughni Al-Abdul Mughni. As part of the agreement, Zain will design, employ, and manage the telecommunications infrastructure within both the residential tower and the commercial complex. The scope of services includes high-speed internet, Voice over IP (VoIP), IPTV, mobile network (GSM) coverage, Wi-Fi connectivity, closed-circuit television (CCTV), and a wide range of enterprise communication solutions that align with smart city standards and modern digital lifestyles. This partnership aims to equip the entire development with a future-ready digital foundation, ensuring an enhanced, tech-enabled experience for residents, businesses, and visitors. It also supports the operational readiness and long-term attractiveness of the project, positioned in a prime location in the heart of Amman. The collaboration further emphasizes Zain's commitment to pioneering digital transformation and providing tailored technology solutions that meet the evolving needs of real estate industry, business, and community development. It highlights Zain's continued role as a trusted digital enabler and strategic partner to key sectors shaping the future of smart living in Jordan. Commenting on the agreement, Chairman Abdul Mughni Al-Abdul Mughni said: 'This partnership is a significant step toward delivering world-class infrastructure for the Sixth Circle Towers project. Our goal is to create an exceptional environment that delivers premium services to both future residents and investors.' Set to become one of Amman's most recognizable landmarks, Jordan Gate Towers project features a striking architectural design and a strategic location. It includes a residential tower with approximately 215 units, and a southern tower encompassing a hotel, serviced apartments, and office spaces. The project also features a fully integrated commercial center that will serve as a vibrant destination for business, leisure, and lifestyle, further stimulating economic activity in the capital.


Jordan News
02-04-2025
- Jordan News
Devices That Interfere with Your Home Internet - Jordan News
In many homes, certain devices can interfere with the speed and stability of your Wi-Fi network, especially when the router operates on the 2.4 GHz frequency band, which is the most commonly used by most household devices. اضافة اعلان According to Infobae, this frequency is also used by many other electronic devices, which can lead to interference, weak connections, or slow speeds. Here are some of the most prominent devices that significantly affect the signal: Microwave Ovens: These operate on the same 2.4 GHz frequency, and their use can cause temporary interruptions in the connection. Cordless Phones: Some older models also use this frequency, leading to signal interference. Baby Monitors and Wireless Cameras: These can negatively impact connection quality. Bluetooth Devices: Many of them operate on similar frequency bands, causing interference. Smart LED Lights: Especially if they are connected to Wi-Fi networks operating on 2.4 GHz. Wireless Alarm Systems and Remote Controls: These use radio waves, which can interfere with Wi-Fi signals. Improving Wi-Fi Speed To enhance your home Wi-Fi speed, it's important to keep your router away from metallic objects or other items that might block or interfere with the signal. It's recommended to place the router in a central and elevated location within the home to improve coverage. Wi-Fi extenders are ideal if the signal doesn't reach certain rooms well or if your house has multiple floors. Additionally, ensure the router's firmware is up to date and adjust the transmission channels. It's also advised to avoid overloading the network with too many devices connected simultaneously, especially during video calls or live streaming. Best Location for the Router The best place to position your router is in a central area of the home, ideally in an elevated and unobstructed location. This helps distribute the signal more evenly, as the waves will spread in all directions. Avoid placing the router in corners, near large furniture, or in enclosed spaces like closets, as these areas absorb or distort the signal. It's also important to keep the router away from electronic devices that could cause signal interference, such as microwaves, cordless phones, TVs, or even baby monitors. If your home has multiple floors, it's better to place the router on the middle floor or use extenders or mesh systems to extend coverage without affecting speed. Maintaining the Router To clean your router properly, first, unplug it from the power source for safety. Then, use a dry cloth to wipe the surface and remove accumulated dust without scratching the device. For the ventilation openings, where dust can easily accumulate, it's recommended to use a soft brush or a can of compressed air to clear out dirt from hard-to-reach places without needing to open the device or use liquids. It's also important to check the cables to ensure they're not bent, frayed, or covered in dust. Keeping the area around the router clean helps improve air circulation and prevents overheating.