Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle

TrackingPoint-Sniper-Rifle-Working.jpg

TrackingPoint Sniper-Rifle

The modern military is heading step by step in a more technological direction. With each day, as more experience is gained, technology is implemented into more aspects of battle. One recent innovation in the field of technology being frequently used in a wide variety of means is the smart weapons. These weapons make use of technological means in order to shoot more accurately and from a greater distance. One such example is the technological sniper rifle.        

But then again, having weapons become more technological also holds many dangers, as technology make them vulnerable to different, perhaps greater, risks. There may come a time when an enemy exploits that vulnerability to cyber hack the weapon and disable it from a distance, or at least manipulate it into not working properly. 

The Black Hat Cyber and Security Information conference, which takes place every year in Las Vegas, has hosted this year the researchers Runa Sandvik and Michael Auger, who proved to everyone in real-time how they can remote-control this sniper rifle – Tracking Point’s TP750. The weapon is based on a WiFi connection and a Linux Operating System, which aided the two researchers in accomplishing their task. After breaking in the system, they can neutralize the weapon’s shooting ability completely, make it miss its target or even get it to hit a completely different one.

The two researchers, who lead a personal relationship beyond the work hours in the lab, have presented to the viewers their discovery, step by step, to prove how much overly depending on technology can, well, backfire. In a world so full of technology, with more devices which started out very low-tech now being highly technological, companies developing these products must make sure that they are fully secured should they happen to end up in the wrong hands.
I-hls: http://bit.ly/1Mvvir7

 

« China Calls US a 'Cyber Bully' After False Accusation
Seamless Technology Is a Gift for Cybercriminals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

infineon - IoT Security

infineon - IoT Security

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Mission Secure (MSi)

Mission Secure (MSi)

MSi is a specialized provider of next generation cyber defense solutions protecting control systems and critical physical assets in energy, transportation and defense.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

CyberArrow

CyberArrow

CyberArrow (formerly EBDAA) is a consultancy company providing high quality consultancy services in Risk & Compliance and Awareness & Education.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Department of Justice - Office of Cybercrime (DOJ-OOC)

Department of Justice - Office of Cybercrime (DOJ-OOC)

The Office of Cybercrime within the Philippines Department of Justice is the Central Authority in all matters relating to international mutual assistance and extradition for cybercrime.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.