F-35 Is The Most Thoroughly Tested Cyber Weapon

The cutting-edge F-35 stealth fighter jet is probably one of the most cyber tested weapons systems that exists in the US department of defence inventory, it's maker says.

With almost nine million lines of software code contained within it, the warplane has previously been described by Britain's Lightning Force as essentially a flying computer.

The multimillion-pound supersonic F-35 Lightning II Joint Strike Fighter is considered to be one of the most sophisticated aircraft ever developed. The UK is embarked on a £9.1 billion program to buy 48 by 2025 of the F-35, but has pledged to purchase 138. 

Steve Over, the director of F-35 international business development at Lockheed Martin, the company which manufactures the jet, said it is probably one of the "most cyber tested weapons systems that exists in US Department of Defence inventory".

He told the Press Association: "To our knowledge we have passed every cyber test that has been applied against the F-35, but it is not an area where any of us, the US, Lockheed or our customers can afford to be complacent.

"This is an area where you have to remain vigilant, and we have to remain committed to continuing the evolution of all the IT systems on the airplane so that we stay ahead of the cyber threat that is very real and very existential."

Asked whether a cyber-attack could be conducted or carried out from an F-35 jet, he stopped short of providing an answer. "I know of nothing there we can talk about," Mr Over said.

Britain currently has 15 of the F-35B, the short take off and vertical landing variant, based in the US where they are being used for testing and training. 

News AU

You Might Also Read: 

AI Defeats Human Fighter Pilots:

Aircraft Can Be Successfully Hacked In-Flight:
 

 

« Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users
Google Workers Are Revolting »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

GlobalPlatform

GlobalPlatform

GlobalPlatform’s specifications are highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum is a catalyst platform designed to create a more resilient and better cyberworld for all.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.