<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://scarcs.ca/lib/exe/css.php?s=feed" type="text/css"?>
<feed version="0.3" xmlns="http://purl.org/atom/ns#">
    <title>Sun Coast Amateur &lt;br&gt;Radio Club Society - blog:2022-01-11</title>
    <tagline></tagline>
    <link rel="alternate" type="text/html" href="https://scarcs.ca/"/>
    <id>https://scarcs.ca/</id>
    <modified>2026-05-10T12:22:01+00:00</modified>
    <generator>FeedCreator 1.8</generator>
    <entry>
        <title>raspberry_pi_can_detect_malware_by_scanning_for_em_waves</title>
        <link rel="alternate" type="text/html" href="https://scarcs.ca/blog/2022-01-11/raspberry_pi_can_detect_malware_by_scanning_for_em_waves"/>
        <created>2022-01-12T03:12:30+00:00</created>
        <issued>2022-01-12T03:12:30+00:00</issued>
        <modified>2022-01-12T03:12:30+00:00</modified>
        <id>https://scarcs.ca/blog/2022-01-11/raspberry_pi_can_detect_malware_by_scanning_for_em_waves</id>
        <author>
            <name>Anonymous</name>
        </author>
        <summary>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;raspberry_pi_can_detect_malware_by_scanning_for_em_waves&quot;&gt;Raspberry Pi Can Detect Malware By Scanning for EM Waves&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
From &lt;a href=&quot;https://gizmodo.com/raspberry-pi-can-detect-malware-by-scanning-for-electro-1848339130&quot; class=&quot;urlextern&quot; title=&quot;https://gizmodo.com/raspberry-pi-can-detect-malware-by-scanning-for-electro-1848339130&quot; rel=&quot;ugc nofollow&quot;&gt; Gizmodo&lt;/a&gt;:
&lt;/p&gt;
&lt;blockquote  class=&quot;blockquote-plugin&quot;&gt;
&lt;p&gt;
A team of researchers at France’s Research Institute of Computer Science and Random Systems created an anti-malware system centered around a Raspberry Pi that scans devices for electromagnetic waves. As reported by Tom’s Hardware, the security device uses an oscilloscope (Picoscope 6407) and H-Field probe connected to a Raspberry Pi 2B to pick up abnormalities in specific electromagnetic waves emitted by computers that are under attack, a technique the researchers say is used to “obtain precise knowledge about malware type and identity.”
&lt;/p&gt;

&lt;/blockquote&gt;
&lt;/div&gt;
</summary>
    </entry>
</feed>
