One attack mentioned in this weeks video was a “side channel attack” there is one known as the TEMPEST attack, in this type of attack special equipment is used to capture the RF signals emitted from an electric device, such as a computer monitor. Attackers are then able to reconstruct the output of the monitor. Such methods can be used to capture data before it is encrypted. an SO could implement RF blocking material to prevent stray RF signals from being captured or read
SUPPORT
Please Note:
The support ticket system is for technical questions and post-sale issues.