Researchers found that if they could deploy a tiny piece of malware to a target computer, the machine's memory could be used to transmit low-power radio emissions. The signal isn't strong enough to carry data natively, but researchers used it to send out a sort of morse-code of 0s and 1s that could be interpreted by a nearby cell phone with companion malware. The trick isn't easy to pull off, but it's discreet enough to subvert common security protocols for air-gapped networks -- which often ban smartphones, but allow mobile phones that only make and receive calls and text messages.

Obviously the system has limitations, and can only smuggle out tiny portions of data at a time -- but that's enough to nab a password or an important GPS location that could wreak more havoc later on. This kind of attack isn't likely to affect most networks, but can be a nightmare for secure networks in government or nuclear power facilities. Work for one of those places? Check out the paper at the source link below to familiarize yourself with the issue.

[Image Credit: Sergio Azenha / Alamy]