Tag Archive for: crosses

Hacking The Aether: How Data Crosses The Air-Gap


It is incredibly interesting how many parts of a computer system are capable of leaking data in ways that is hard to imagine. Part of securing highly sensitive locations involves securing the computers and networks used in those facilities in order to prevent this. These IT security policies and practices have been evolving and tightening through the years, as malicious actors increasingly target vital infrastructure.

Sometimes, when implementing strong security measures on a vital computer system, a technique called air-gapping is used. Air-gapping is a measure or set of measures to ensure a secure computer is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. Sometimes it’s just ensuring the computer is off the Internet. But it may mean completely isolating for the computer: removing WiFi cards, cameras, microphones, speakers, CD-ROM drives, USB ports, or whatever can be used to exchange data. In this article I will dive into air-gapped computers, air-gap covert channels, and how attackers might be able to exfiltrate information from such isolated systems.

Many techniques presented here (but not all) would require a previous breach to have already compromised the isolated machine (usually installing some kind of malware in the process). This may have happened via a social engineering attack, an inside job, an undercover special operation or whatever James Bond scenario you have in mind, it’s not important for the current article scope. Although the malware delivery mechanism makes for an interesting problem and discussion, the scope of this article is on how to exfiltrate data after the breach (if a breach was, in fact, needed).

What is an Air-Gap Covert Channel?

An air-gap covert channel could be defined as any unintentional channel that is used to transmit and/or receive data between systems that are physically isolated and, by policy, not authorized to communicate with one another, in which air-gapping measures were taken at the emitter, receiver or both. Unintentional means that the channel was not originally designed to be used as a data channel, for example, the modem LEDs. Although there might me…

Source…

TCS Delivers Strong Q3; Rev Crosses $7 bn Propelled by Cloud Demand and Market Share Gains


–          Revenue Growth of +13.5% YoY in CC; 8.4% YoY in USD

–          Growth led by North America & UK (+15.4% YoY in CC)

–          Operating Margin at 24.5%; Net Margin at 18.6%

–          IT Services Attrition trending down: LTM Attrition at 21.3%

–          Board Announces Dividend of `75/share Including Special Dividend of `67/share
 

MUMBAI, January 9, 2023: Tata Consultancy Services (BSE: 532540, NSE: TCS) reported its consolidated financial results according to Ind AS and IFRS, for the quarter ending December 31, 2022.


Highlights of the Quarter Ended December 31, 2022

  • Revenue at 7.075 billion, +8.4% YoY, +13.5% YoY in constant currency
  • Order Book at $7.8 billion | Book to Bill at 1.1
  • Operating Margin at 24.5%; contraction of 0.5% YoY
  • Net Income at $1.318 billion, +1.1% YoY | Net Margin at 18.6%
  • Net Cash from Operations at $1.354 billion ie 102.8% of Net Income
  • Net headcount addition of -2,197 |Workforce strength: 613,974
  • Diverse and inclusive workplace: Women in the workforce: 35.7% | 153 Nationalities
  • Building a G&T workforce: 11.4 million learning hours clocked | 1.3 million competencies acquired
  • LTM IT Services attrition rate at 21.3%
  • Total Dividend per share of `75 per share including `67 as special dividend
    Record date 17/01/2023 | Payment date 03/02/2023
  • Total Shareholder Payout of `33,297crore Year till Date


Rajesh Gopinathan, Chief Executive Officer and Managing Director
, said: “We are pleased with our strong growth in a seasonally weak quarter, driven by cloud services, market share gains through vendor consolidation, and continued momentum in North America and UK. The sustained strength of demand for our services is a validation of the value we provide to our clients in helping them differentiate themselves, while enhancing their competitiveness. Looking ahead, and beyond current uncertainties, our longer-term growth outlook remains robust.”
 

N Ganapathy Subramaniam, Chief Operating Officer and Executive Director, said: “As I look back at 2022, it’s gratifying to see the privileged partnership that we continue to enjoy with our clients globally. In a hybrid working model we delivered many complex…

Source…

Mobile security solution Kepplr crosses 20K users in two months – VC Circle

Mobile security solution Kepplr crosses 20K users in two months
VC Circle
Kepplr, a cloud-based cross platform data sync and device security solution that helps locate a mobile phone, retrieve call logs, remotely wipe out data and lock the device, has crossed 20,000 registered users since its launch in September this year

“mobile security” – read more