Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle

TrackingPoint-Sniper-Rifle-Working.jpg

TrackingPoint Sniper-Rifle

The modern military is heading step by step in a more technological direction. With each day, as more experience is gained, technology is implemented into more aspects of battle. One recent innovation in the field of technology being frequently used in a wide variety of means is the smart weapons. These weapons make use of technological means in order to shoot more accurately and from a greater distance. One such example is the technological sniper rifle.        

But then again, having weapons become more technological also holds many dangers, as technology make them vulnerable to different, perhaps greater, risks. There may come a time when an enemy exploits that vulnerability to cyber hack the weapon and disable it from a distance, or at least manipulate it into not working properly. 

The Black Hat Cyber and Security Information conference, which takes place every year in Las Vegas, has hosted this year the researchers Runa Sandvik and Michael Auger, who proved to everyone in real-time how they can remote-control this sniper rifle – Tracking Point’s TP750. The weapon is based on a WiFi connection and a Linux Operating System, which aided the two researchers in accomplishing their task. After breaking in the system, they can neutralize the weapon’s shooting ability completely, make it miss its target or even get it to hit a completely different one.

The two researchers, who lead a personal relationship beyond the work hours in the lab, have presented to the viewers their discovery, step by step, to prove how much overly depending on technology can, well, backfire. In a world so full of technology, with more devices which started out very low-tech now being highly technological, companies developing these products must make sure that they are fully secured should they happen to end up in the wrong hands.
I-hls: http://bit.ly/1Mvvir7

 

« China Calls US a 'Cyber Bully' After False Accusation
Seamless Technology Is a Gift for Cybercriminals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Futurex

Futurex

Futurex is a globally recognized provider of enterprise-class data encryption solutions.

CyberSec.sk (CSSk)

CyberSec.sk (CSSk)

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

VIQU Recruitment

VIQU Recruitment

VIQU Recruitment was formed with the primary focus of providing 'Smarter People Solutions' to the UK’s professional IT & Cyber Security markets.

Navixia

Navixia

As a leading Swiss IT security specialist, Navixia offers a global and pragmatic approach to information security.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.