Information security experts worry that drones will become the next wave of hacker targets

Network cameras and routers have been infected into botnets, which are used to launch decentralized blocking service attacks in the United States and Europe, which have caused global attention to the security of Internet of Things information. However, not only network cameras that are easily exploited by hackers, information security experts believe that UAVs are also a target for hackers to easily succeed, and may become the next wave of hacker infections.

Information security experts worry that drones will become the next wave of hacker targets

Internet of things devices, such as network cameras, are often intentionally or unintentionally ignored for easy installation and use. In order to be easy to set up, there is often no use of open communication, communication without encryption, etc., users often feel that they can use Just like, information security is extremely neglected. This point, the drones are exactly the same, and the former example of IoT devices let the world know that any device that is connected to the network will soon become the target of hackers.

The drone was originally vulnerable to interference attacks. In 2015, a former US Department of Defense expert at the Defcon Security Conference demonstrated how to interfere with the drone with a pulsed GPS signal to allow the drone to crash. The security portal was opened, and there was an earlier method of intrusion control. At the RSA Encryption Calculation Conference in March 2016, researchers used laptops and cheap USB devices to crack high-end drones used by the military and police government, and could be remotely controlled.

The information security vulnerabilities of drones are the same as the information security vulnerabilities of computers. Updates can also be used to block vulnerabilities. However, this involves the attitude of vendors. Generally speaking, high-end drones are frequently updated and blocked by time. Information security vulnerabilities, but cheap drone manufacturers often do not care about vulnerabilities, or for a long time to be renewed, resulting in a large increase in non-defense period.

At present, the drones that open the hacker information security portal are easy, but most of them still have a manual intrusion, but information security experts warn that someone will soon write a virus that can automatically infect the infection. It is expected that 2017 will be There are related hacking tools circulating. At that time, the disaster caused by the drones will soon be headlined. In addition, the military and police government increasingly uses drones to monitor crimes and protests, which also makes these public The drone of the agency became the target of being able to get started.

The value of commercial drones is not high at present, but if Amazon wants to develop drone delivery, when the drones carry valuable goods, the incentives for the invasion will increase greatly, and the hackers may target the delivery. Machine attack, let the drone land to steal the goods, of course, if Amazon uses drones to deliver goods, the information security level is not the same as that of the current camera drone, which is still a foot high. Demon is a high-profile, look at Amazon's information security technology. In any case, the information security issue of drones is bound to become an important issue in the near future.

Lithium Ion Battery

Lithium Ion Battery,5G Integrated Battery,Custom Ups Lithium Ion Battery,Communication Ladder Backup Battery

Wolong Electric Group Zhejiang Dengta Power Source Co.,Ltd , https://www.wldtbattery.com