1. IT-Security >
  2. Cyber Security Nachrichten >
  3. Hackers Can Fake Radio Signals To Hijack Aircraft Landing Systems, Warn Researchers


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Hackers Can Fake Radio Signals To Hijack Aircraft Landing Systems, Warn Researchers

RSS Kategorie Pfeil IT Security Nachrichten vom | Quelle: it.slashdot.org Direktlink öffnen

Hackers could hijack the systems used to guide planes by compromising and spoofing the radio signals that are used during landing. From a report: That's according to a team of researchers at Northeastern University in Boston, who have detailed their research in a recently published white paper. "Modern aircraft heavily rely on several wireless technologies for communications, control, and navigation. Researchers demonstrated vulnerabilities in many aviation systems," said the academics. "However, the resilience of the aircraft landing systems to adversarial wireless attacks have not yet been studied in the open literature, despite their criticality and the increasing availability of low-cost software-defined radio (SDR) platforms." After analysing the instrument system waveforms, the researchers found that hackers can spoof such radio signals using commercially available tools. With them, attackers are able to cause last-minute go-around decisions and even make the plane miss its landing zone in low-visibility scenarios.

Read more of this story at Slashdot.

...

Webseite öffnen Komplette Webseite öffnen

Newsbewertung

Kommentiere zu Hackers Can Fake Radio Signals To Hijack Aircraft Landing Systems, Warn Researchers






Ähnliche Beiträge

  • 1. Hackers Can Fake Radio Signals To Hijack Aircraft Landing Systems, Warn Researchers vom 365.66 Punkte ic_school_black_18dp
    Hackers could hijack the systems used to guide planes by compromising and spoofing the radio signals that are used during landing. From a report: That's according to a team of researchers at Northeastern University in Boston, who have detailed their research
  • 2. UACME - Defeating Windows User Account Control vom 239.83 Punkte ic_school_black_18dp
    Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10 (client, some methods however works on server version too). Admin account with UAC set on default settings required. UsageRun executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See "Run examples" below for more info.F
  • 3. F-Secure Looks to Address Cyber Security Risks in Aviation Industry vom 169.98 Punkte ic_school_black_18dp
    Aviation, as part of the transportation sector, falls within the critical infrastructure. While it may not have the same security issues as ICS/SCADA-based manufacturing and utilities, it has certain conceptual similarities; including, for example, a
  • 4. F-Secure Looks to Address Cyber Security Risks in Aviation Industry vom 169.98 Punkte ic_school_black_18dp
    Aviation, as part of the transportation sector, falls within the critical infrastructure. While it may not have the same security issues as ICS/SCADA-based manufacturing and utilities, it has certain conceptual similarities; including, for example, a
  • 5. Radio Astronomers Are Increasingly Using Convolutional Neural Networks To Sift Through Massive Amounts of Data vom 148.92 Punkte ic_school_black_18dp
    Radio astronomers have so far cataloged fewer than 300 fast radio bursts, mysterious broadband radio signals that originate from well beyond the Milky Way. Almost a third of them -- 72, to be precise -- were not detected by astronomers at all but instead
  • 6. Mysterious, Ancient Radio Signals Keep Pelting Earth. Astronomers Designed an AI to Hunt Them Down. vom 129.25 Punkte ic_school_black_18dp
    An anonymous reader shares a report: Sudden shrieks of radio waves from deep space keep slamming into radio telescopes on Earth, spattering those instruments' detectors with confusing data. And now, astronomers are using artificial intelligence to pinpoint
  • 7. Astronomers Detect Mysterious Radio Signals Coming From Outside Our Galaxy vom 121 Punkte ic_school_black_18dp
    This week the New York Post reported on "powerful radio signals which have been detected repeatedly in the same exact location in space," generating as much energy as the sun does in a whole day, in "the only known instance in which these signals have
  • 8. Get Ready For Atomic Radio vom 113.32 Punkte ic_school_black_18dp
    An anonymous reader quotes a report from MIT Technology Review: David Anderson at Rydberg Technologies in Ann Arbor, Michigan, and a couple of colleagues, have reinvented the antenna from scratch. Their new device works in an entirely different way from
  • 9. SpaceX Details Its Plans For Landing Three Falcon Heavy Boosters At Once vom 109.08 Punkte ic_school_black_18dp
    An anonymous reader quotes a report from Ars Technica: As part of the process to gain federal approval for the simultaneous landing of its Falcon Heavy rocket boosters in Florida, SpaceX has prepared an environmental assessment of the construction of
  • 10. World's Largest Aircraft Completes Its First Flight vom 107.62 Punkte ic_school_black_18dp
    The world's largest aircraft has finally completed its first flight after months of preparation and years of searching for funding. The Airlander 10 as it's called spent 20 minutes in the air on Wednesday, landing safely at Cardington Airfield north of
  • 11. Combating Potentially Harmful Applications with Machine Learning at Google: Datasets and Models vom 103.54 Punkte ic_school_black_18dp
    Posted by Mo Yu, Android Security & Privacy Team In a previous blog post, we talked about using machine learning to combat Potentially Harmful Applications (PHAs). This blog post covers how Google uses machine learning techniques to detect and classify P
  • 12. Combating Potentially Harmful Applications with Machine Learning at Google: Datasets and Models vom 103.54 Punkte ic_school_black_18dp
    Posted by Mo Yu, Android Security & Privacy Team[Cross-posted from the Android Developers Blog]In a previous blog post, we talked about using machine learning to combat Potentially Harmful Applications (PHAs). This blog post covers how Google uses machine