Aug. 31, 2022, 3 p.m. |

New Scientist - Technology www.newscientist.com

A hacking device can be placed under a table and use electromagnetic signals to mimic human touch on nearby touchscreens. It could then be used to secretly download malware or send money

device hacking screen smartphone

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Intermediate Security Engineer, (Incident Response, Trust & Safety)

@ GitLab | Remote, US

Journeyman Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Project Manager II - Compliance

@ Critical Path Institute | Tucson, AZ, USA

Junior System Engineer (m/w/d) Cyber Security 1

@ Deutsche Telekom | Leipzig, Deutschland