Drones have conquered the world: they are used to hunt down tax evaders and illegal hunters, help suppress wildfires, find victims after natural disasters… They even serve as flying cameras to assist in filming movies and for aerial photography.
Online retail giant Amazon, for example, is planning on using drones for commercial delivery in order to fly purchases right to customers’ front doors. Despite being originally developed for military purposes, drones are slowly finding their place into our everyday lives.  However, just as with every other technology, these unmanned aerial vehicles can pose a serious threat if they fall into the wrong hands.
Among other things, drones can be used as highly effective spies. Their ability to get close to almost any place where confidential data is stored (for example, an office) without being seen, makes them the perfect spy. Not only because of their ability to carry cameras and capture images through windows, but also because they can make the perfect weapon to carry out sophisticated cyber-attacks.
Drones can be used by cyber-criminals to easily get their malicious tools close to their target without having to overcome the physical barriers that the potential victim may have in place (security guards, access control systems, biometric sensors, surveillance cameras, etc.).
A drone could hide, for example, a jammer, a malicious hotspot, a device to launch attacks via Bluetooth or NFC, etc. The number of ways in which these aerial devices can be used to spy on victims and steal confidential information is almost endless.
Such is the risk that there are countries such as Sweden that have ruled that camera drones qualify as surveillance cameras, banning their use unless the drone operator has the necessary permit.
However, a cyber-criminal that wanted to use a drone to carry out an attack would still have another option: to take control of someone else’s device. Unfortunately, many of today’s models have vulnerabilities that could allow a remote attacker to take control of them.
Drone manufacturers have the responsibility to increase the security of their aircrafts to mitigate the security and privacy concerns raised by them. As this technology becomes ever more present in our lives, it is clear that the notion of safety and security in IT systems cannot be limited to computers and smartphones, but should also reach other high-flying devices. In this respect, having the cyber-security protection that best adapts to your needs is absolutely essential.
5 comments
Shovels have conquered the world: they are used to dig holes, search for buried treasure, and help suppress wildfires, find victims after natural disasters… They even serve as symbols of progress, used at groundbreaking ceremonies around the world.
Among other things, shovels can be used as highly effective, silent weapons. Their ability to get close to almost any victim (for example, at an office) without being heard, makes them the perfect multi-tool for murder.
A shovel could dig holes to hide, for example, a body, a malicious pet, a device to launch attacks via explosion, etc. The number of ways in which these devices can be used against victims is almost endless.
A cyber-criminal that wanted to use a shovel to carry out an attack would have another option: to manually take control of someone else’s shovel. Unfortunately, many of today’s shovels have vulnerabilities that could allow a attacker to take control of them (rubber grips/no safeties/d-handles).
Shovel manufacturers have the responsibility to increase the security of their product to mitigate the security and silent weapon concerns raised by them. As fear-mongering becomes ever more present in our lives, it is clear that the notion of safety and security in digging systems cannot be limited to backhoes and augers, but should also reach other similar devices. In this respect, having the protection that best adapts to your needs is absolutely essential (hardhats/situational awareness).
Thanks for your comment, a very interesting take on cyber security and shovels. Cheers.
Great! very nice……..Thank you for this post.
Thanks for reading us!
Best regards,
Panda Security.
Get The Dissertation Writing Service Students Look For These Days With The Prime Focus Being Creating A Well Researched And Lively Content On Any Topic.