Wednesday, July 23, 2014

Stalking Prey: An RF Hackers Perspective

Stalking Prey: An RF Hacker's Perspective
by Signals Defense Chief Security Officer Rick Mellendick




 

Nearly everyone has an RF signature, and it is becoming as common as your fingerprint. This signature is the culmination of device and device usage ....








              .....an attacker can use your RF signature to track you and attack


Read more on page 51; http://www.uscybersecurity.net/Pages/current_online_magazine.html





No comments:

Post a Comment