At last month's Defcon, the United States Air Force invited pre-selected hackers to attempt to sabotage an F-15 fighter-jet data system:
And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight.
Pleased with the results, the USAF has announced that next year's Defcon will feature an assault on a satellite. There will again be a pre-screening and qualifying process:
Sometime soon, the Air Force will put out a call for submissions. Think you know how to hack a satellite or its ground station? Let them know. A select number of researchers whose pitches seem viable will be invited to try out their ideas during a “flat-sat” phase—essentially a test build comprising all the eventual components—six months before Defcon. That group will once again be culled; the Air Force will fly the winners out to Defcon for a live hacking competition.
The tentative plan is to allow the hackers to try to take control of an orbiting satellite:
“What we’re planning on doing is taking a satellite with a camera, have it pointing at the Earth, and then have the teams try to take over control of the camera gimbals and turn toward the moon”
You can find information about Defcon 28 here.
Graham Clark, the 17-year-old Florida boy accused of pulling off the big Twitter hack, pled not guilty to charges on Tuesday. During the security breach, top accounts including Democratic presidential candidate Joe Biden and Tesla/SpaceX CEO Elon Musk were taken over to push a bitcoin scam.
In this footage, a supercomputer’s CPU cores — nearly 900 of them — are neatly lined up in the Task Manager. The Doom logo appears, generated by code that targets each core. Then Doom itself plays, each “pixel” generated by thrashing a core with just the right amount of busy work. Max Holt: Finally got […]
The UK government today ordered domestic companies to stop buying equipment from Chinese vendor Huawei and to stop using its kit entirely by 2027. Huawei is suspected to be an arm of the Chinese government, breaking into western markets (and maybe its networks) by selling impossibly cheap equipment. The UK only recently approved more Huawei […]
You may not realize it, but some of the biggest films in movie history have been edited using the same tools some of you use to cut your video of vacationing at Disney World. Giant movies from Oscar favorites The Social Network and Gone Girl to blockbusters like Avatar, Deadpool, and last year’s Terminator: Dark […]
Now that the initial furor and shortages have subsided, it’s probably not a bad time to start considering your long-term cleaning and disinfecting plans. Sure, that might seem anywhere from overly cautious to outright ridiculous, but the threat of COVID-19 appears poised to be present for a while and the need for quick travel clean-up […]
With more and more companies moving all their operations into the cloud, the need has never been greater for those with the skills to map exactly how an organization reconstitutes itself in that new environment. Network architects responsible for determining all the communication, storage, and infrastructure needs of an expansive organization are among the most […]