Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle

TrackingPoint-Sniper-Rifle-Working.jpg

TrackingPoint Sniper-Rifle

The modern military is heading step by step in a more technological direction. With each day, as more experience is gained, technology is implemented into more aspects of battle. One recent innovation in the field of technology being frequently used in a wide variety of means is the smart weapons. These weapons make use of technological means in order to shoot more accurately and from a greater distance. One such example is the technological sniper rifle.        

But then again, having weapons become more technological also holds many dangers, as technology make them vulnerable to different, perhaps greater, risks. There may come a time when an enemy exploits that vulnerability to cyber hack the weapon and disable it from a distance, or at least manipulate it into not working properly. 

The Black Hat Cyber and Security Information conference, which takes place every year in Las Vegas, has hosted this year the researchers Runa Sandvik and Michael Auger, who proved to everyone in real-time how they can remote-control this sniper rifle – Tracking Point’s TP750. The weapon is based on a WiFi connection and a Linux Operating System, which aided the two researchers in accomplishing their task. After breaking in the system, they can neutralize the weapon’s shooting ability completely, make it miss its target or even get it to hit a completely different one.

The two researchers, who lead a personal relationship beyond the work hours in the lab, have presented to the viewers their discovery, step by step, to prove how much overly depending on technology can, well, backfire. In a world so full of technology, with more devices which started out very low-tech now being highly technological, companies developing these products must make sure that they are fully secured should they happen to end up in the wrong hands.
I-hls: http://bit.ly/1Mvvir7

 

« China Calls US a 'Cyber Bully' After False Accusation
Seamless Technology Is a Gift for Cybercriminals »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

Futurex

Futurex

Futurex is a globally recognized provider of enterprise-class data encryption solutions.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Digital Element

Digital Element

Digital Element is a global IP geolocation and intelligence leader with unrivaled expertise in leveraging IP address insights to deliver new value to companies.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

NewEvol

NewEvol

Don’t React, Evolve! Outsmart threats with real-time AI-powered dynamic defense capability of NewEvol all-in-one cybersecurity platform.