MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

Researchers demonstrated how two (or more) Air-Gapped computers can covertly exchange data via ultrasonic waves.