F-35 Is The Most Thoroughly Tested Cyber Weapon

The cutting-edge F-35 stealth fighter jet is probably one of the most cyber tested weapons systems that exists in the US department of defence inventory, it's maker says.

With almost nine million lines of software code contained within it, the warplane has previously been described by Britain's Lightning Force as essentially a flying computer.

The multimillion-pound supersonic F-35 Lightning II Joint Strike Fighter is considered to be one of the most sophisticated aircraft ever developed. The UK is embarked on a £9.1 billion program to buy 48 by 2025 of the F-35, but has pledged to purchase 138. 

Steve Over, the director of F-35 international business development at Lockheed Martin, the company which manufactures the jet, said it is probably one of the "most cyber tested weapons systems that exists in US Department of Defence inventory".

He told the Press Association: "To our knowledge we have passed every cyber test that has been applied against the F-35, but it is not an area where any of us, the US, Lockheed or our customers can afford to be complacent.

"This is an area where you have to remain vigilant, and we have to remain committed to continuing the evolution of all the IT systems on the airplane so that we stay ahead of the cyber threat that is very real and very existential."

Asked whether a cyber-attack could be conducted or carried out from an F-35 jet, he stopped short of providing an answer. "I know of nothing there we can talk about," Mr Over said.

Britain currently has 15 of the F-35B, the short take off and vertical landing variant, based in the US where they are being used for testing and training. 

News AU

You Might Also Read: 

AI Defeats Human Fighter Pilots:

Aircraft Can Be Successfully Hacked In-Flight:
 

 

« Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users
Google Workers Are Revolting »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

HDI Global SE

HDI Global SE

HDI Global SE provides customised insurance solutions for industrial and commercial clients worldwide including Cyber Liability insurance.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

HackNotice

HackNotice

HackNotice Teams is an all-in-one encompassing tool that monitors threats within your organization, different vendors, and third parties whose services you use.

Tutanota

Tutanota

Tutanota is the world’s first end-to-end encrypted mail service that encrypts the entire mailbox.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Wired Assurance

Wired Assurance

Wired Assurance is a testing and assurance company, specialized in software applications and blockchain smart contracts.

Corinium Global Intelligence

Corinium Global Intelligence

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.