Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

    Mayıs 1, 2026

    Samsung Electronics Offers Free 32-Inch Odyssey gaming monitor: Eligibility and How to Claim Deal

    Mayıs 1, 2026

    T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

    Mayıs 1, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

      Mayıs 1, 2026

      T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

      Mayıs 1, 2026

      This Portable Mini PC Is the Unexpected Raspberry Pi Alternative You Might Actually Want

      Mayıs 1, 2026

      Samsung warns RAM shortages could worsen beyond 2027

      Mayıs 1, 2026

      Oxford study finds friendly AI chatbots are less accurate

      Mayıs 1, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » HDMI Radiation: A New Way Hackers Can Steal Your Display Data
    Tech

    HDMI Radiation: A New Way Hackers Can Steal Your Display Data

    By ayaksızKasım 20, 2024Yorum yapılmamış2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A new form of electronic surveillance, inspired by traditional methods of video signal interception, has recently been discovered by researchers in Uruguay, adding an unnerving twist to the concept of digital espionage. A team from the University of the Republic in Montevideo published their findings earlier this year on Cornell’s ArXiv platform, demonstrating that it’s possible to intercept and decode video data from HDMI cables using artificial intelligence (AI), even without physical access to the target device.

    Despite HDMI being a wired connection, the electromagnetic radiation emitted by these cables carries enough information to be intercepted remotely. This electromagnetic radiation, which is typically encrypted using HDCP (High-bandwidth Digital Content Protection), still contains fluctuations that can be captured wirelessly. By training an AI model to recognize and interpret these fluctuations, the researchers were able to decode the data with a 70 percent accuracy rate, a significant improvement over previous attempts, which only achieved around 10 percent accuracy. While not perfect, this 70 percent accuracy is more than sufficient to extract sensitive data such as passwords, usernames, and other personal information.

    This AI-assisted surveillance method has frightening implications, as it enables espionage without direct access to the target device. In ideal conditions, it is even possible to intercept the signals from outside a building, making it a powerful tool for covert spying. The vulnerability, known as TEMPEST (Transient ElectroMagnetic Pulse Emanation STandard), has been around since World War II, but until now, it was thought that the encryption in HDMI signals would render them secure. The researchers’ method, called “Deep-TEMPEST,” proves that even encrypted HDMI transmissions can be vulnerable to electromagnetic radiation interception.

    While this method is unlikely to affect the average user, the implications are significant for government agencies, corporations, and anyone working with sensitive data. The sophisticated nature of the attack means it requires the attacker to be within range of the target, but this is still a serious concern for high-profile targets. The researchers suggest that state-sponsored spies and industrial espionage agents may already be using similar methods. As a result, organizations dealing with sensitive information may want to consider implementing additional security measures, such as electromagnetic shielding, particularly for remote workers who may be more vulnerable to such sophisticated attacks.

    Post Views: 243
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    Google Maps vs Waze: I Put the Two Best Navigation Apps Head-to-Head — and One Clearly Came Out on Top

    Mayıs 1, 2026

    T-Mobile Bundles Free Hulu and Netflix for 5G Users: Eligibility Explained

    Mayıs 1, 2026

    This Portable Mini PC Is the Unexpected Raspberry Pi Alternative You Might Actually Want

    Mayıs 1, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.