Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle

TrackingPoint-Sniper-Rifle-Working.jpg

TrackingPoint Sniper-Rifle

The modern military is heading step by step in a more technological direction. With each day, as more experience is gained, technology is implemented into more aspects of battle. One recent innovation in the field of technology being frequently used in a wide variety of means is the smart weapons. These weapons make use of technological means in order to shoot more accurately and from a greater distance. One such example is the technological sniper rifle.        

But then again, having weapons become more technological also holds many dangers, as technology make them vulnerable to different, perhaps greater, risks. There may come a time when an enemy exploits that vulnerability to cyber hack the weapon and disable it from a distance, or at least manipulate it into not working properly. 

The Black Hat Cyber and Security Information conference, which takes place every year in Las Vegas, has hosted this year the researchers Runa Sandvik and Michael Auger, who proved to everyone in real-time how they can remote-control this sniper rifle – Tracking Point’s TP750. The weapon is based on a WiFi connection and a Linux Operating System, which aided the two researchers in accomplishing their task. After breaking in the system, they can neutralize the weapon’s shooting ability completely, make it miss its target or even get it to hit a completely different one.

The two researchers, who lead a personal relationship beyond the work hours in the lab, have presented to the viewers their discovery, step by step, to prove how much overly depending on technology can, well, backfire. In a world so full of technology, with more devices which started out very low-tech now being highly technological, companies developing these products must make sure that they are fully secured should they happen to end up in the wrong hands.
I-hls: http://bit.ly/1Mvvir7

 

« China Calls US a 'Cyber Bully' After False Accusation
Seamless Technology Is a Gift for Cybercriminals »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Swise

Swise

Swise is a Cyber security and compliance platform for your small business. Simplify and automate your security and compliance with our AI-powered platform.