@sborrill I wonder if you could duplicate his front-door key from that photograph of the supersized one #SideChannelAttack #DontPostKeyMaterialOnTheNationalNews

Did you hear? Hackers can now steal your 2FA codes pixel by pixel on Androidβ€”even bypassing recent security patches. Your phone's own screen might be revealing more than you think. Find out how this tech twist threatens our security.

https://thedefendopsdiaries.com/pixnapping-how-a-new-android-side-channel-attack-steals-2fa-codes-pixel-by-pixel/

#pixnapping
#androidsecurity
#sidechannelattack
#2fa
#cyberthreats

Hackers can steal 2FA codes and private messages from Android phones. The "Pixnapping" attack is a really clever piece of research. It shows that the theoretical wall between apps on your phone isn't as solid as we'd like to believe. By exploiting a GPU side channel, a malicious app with zero permissions can effectively screenshot other apps, one pixel at a time. It's a reminder that security is a stack, and a vulnerability at the hardware level can undermine everything built on top of it.

TL;DR
πŸ‘Ύ A new attack called "Pixnapping" can read visual data from other apps on Android devices.
πŸ”‘ It exploits a GPU side-channel leak to steal sensitive info like 2FA codes and messages, pixel by pixel.
⚠️ The scary part: the malicious app required for the attack needs zero special permissions to be granted.
🧠 While complex to pull off, this is a serious proof of concept that challenges the core idea of OS app sandboxing.

https://arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/
#Android #Cybersecurity #SideChannelAttack #2FA #security #privacy #cloud #infosec

Hackers can steal 2FA codes and private messages from Android phones

Malicious app required to make β€œPixnapping” attack work requires no permissions.

Ars Technica

🚨 Threat Alert: WireTap Attack on Intel SGX Servers

Physical attacks can now compromise SGX enclaves using a low-cost DIY setup (<$1,000). Attackers can extract cryptographic keys, forge enclaves, and threaten blockchain/Web3 networks and confidential computation.

Mitigation considerations:
πŸ›‘ Restrict physical server access
πŸ”‘ Review SGX-dependent systems in blockchain & Web3
πŸ’‘ Monitor for suspicious DRAM bus activity

#WireTap #IntelSGX #HardwareSecurity #CyberSecurity #SideChannelAttack #BlockchainSecurity #Web3 #ServerSecurity #Infosec

🚨 Threat Alert: WireTap Attack on Intel SGX Servers

Physical attacks can now compromise SGX enclaves using a low-cost DIY setup (<$1,000). Attackers can extract cryptographic keys, forge enclaves, and threaten blockchain/Web3 networks and confidential computation.

Mitigation considerations:
πŸ›‘ Restrict physical server access
πŸ”‘ Review SGX-dependent systems in blockchain & Web3
πŸ’‘ Monitor for suspicious DRAM bus activity

#WireTap #IntelSGX #HardwareSecurity #CyberSecurity #SideChannelAttack #BlockchainSecurity #Web3 #ServerSecurity

Lamphone is a clever, optical, side-channel attack that can turn a simple lightbulb into a makeshift microphone. It works because the filament inside a lightbulb subtly vibrates in response to sound waves, like someone talking. These tiny vibrations change the amount of light the bulb emits. By pointing a light sensor or photodiode at the bulb from a distance, a lamphone attack can detect these variations in brightness and convert them back into audio signals, effectively β€œlistening in” on conversations without touching the microphone or the room.

It’s a striking example of how everyday objects can be exploited for surveillance, showing that even something as mundane as a lamp can leak information if you know what to look for.

#OpticalPhreaking #SideChannelAttack #CyberSecurity #Privacy #InformationLeak

The fourth presentation was Ayoub et al.'s "BlueScream: Screaming Channels on Bluetooth Low Energy," exploring real-world firmware attacks via side-channel vulnerabilities in #BLE devices. (https://www.acsac.org/2024/program/final/s103.html) 5/6 #SideChannelAttack #WirelessSecurity
Webcam peeking attacks exploit modern web typography. This analysis uncovers how stylish fonts can compromise your privacy. https://hackernoon.com/distortion-patterns-and-web-text-size-analysis-in-webcam-peeking-attacks #sidechannelattack
Distortion Patterns and Web Text Size Analysis in Webcam Peeking Attacks | HackerNoon

Webcam peeking attacks exploit modern web typography. This analysis uncovers how stylish fonts can compromise your privacy.

Zoom, Skype, and Google Meet were tested under bandwidth strainβ€”here’s what happens to your video quality when your internet connection stutters. https://hackernoon.com/understanding-video-compression-and-resolution-drops-in-zoom-meetings #sidechannelattack
Understanding Video Compression and Resolution Drops in Zoom Meetings | HackerNoon

Zoom, Skype, and Google Meet were tested under bandwidth strainβ€”here’s what happens to your video quality when your internet connection stutters.