June 26, 2015 By Shane Schick 2 min read

You can pack a lot into the average pita: lettuce, tomatoes, sliced chicken — even enough hardware to wirelessly steal data from a nearby laptop.

As reported in Wired, among other sources, a group of researchers from Israel’s Technion research institute and Tel Aviv University have collaborated on a prototype of what’s been described as a spy bug small enough to fit into a sandwich. At a cost of just $300, the Portable Instrument for Trace Acquisition (PITA) includes a controller chip, antenna and software-defined radio that could transmit data from a victim’s computer via Wi-Fi.

Security experts told BBC News they weren’t very impressed with the PITA, given that it needs to be within a range of about 19 inches from a potential victim’s laptop in order to steal data. Still, the researchers proved the device could intercept email information and obtain access credentials in a lab test. Several encryption programs were reportedly worked around as part of the experiment.

The PITA doesn’t need to rely on Wi-Fi, either. Engadget said hackers could also store data on a microSD card. And of course, real cybercriminals probably wouldn’t try to disguise this kind of listening device in food, but would likely put it in a small space near a desk or workspace where it remain undisturbed.

Beyond the ingenuity of the PITA hardware, PC World noted that the researchers made use of a flaw in GnuPG, an open source software from the Free Software Foundation designed to protect user privacy. In the interest of preventing cybercriminals from doing the same thing, however, the flaw was reported to the organization and fixed prior to the paper’s publication.

There are potential measures that would make it difficult for something like the PITA to work. IT Pro wrote that companies might deploy Faraday cages, which are a sort of enclosure that could shield corporate devices from third-party electronic signals. Given that the researchers plan to show off their prototype at a security conference later this year, the best defense tactic will likely be the same one applied to so many other potential threats: increased awareness among potential victims.

More from

Preparing for the future of data privacy

4 min read - The focus on data privacy started to quickly shift beyond compliance in recent years and is expected to move even faster in the near future. Not surprisingly, the Thomson Reuters Risk & Compliance Survey Report found that 82% of respondents cited data and cybersecurity concerns as their organization’s greatest risk. However, the majority of organizations noticed a recent shift: that their organization has been moving from compliance as a “check the box” task to a strategic function.With this evolution in…

The 5 most impactful cybersecurity guidelines (and 3 that fell flat)

4 min read - The best cybersecurity guidelines have made a huge difference in protecting data from theft and compromise, both in the United States and around the world.These guidelines are comprehensive sets of recommended practices, procedures and principles designed to help organizations and individual people safeguard their digital assets, systems and data from malicious attacks. They can cover a wide range of practices and exist in part to collect and share best practices and strategies based on industry standards and expert knowledge. Crucially,…

CISO vs. CEO: Making a case for cybersecurity investments

4 min read - Ask CISOs why they think there is a cyber skills shortage in their organization, what keeps them up at night or what the most important issue facing the industry is — at some point, even if not the first response, they will bring up budgets.For example, at RSA Conference 2024, a roundtable discussion about issues facing the cybersecurity industry, one CISO stated bluntly that budgets — or lack thereof — are the biggest problem. At a time when everything is…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today