MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data
Researchers demonstrated how two (or more) Air-Gapped computers can covertly exchange data via ultrasonic waves.