Featured Articles

Intel releases tiny 3G cell modem

Intel releases tiny 3G cell modem

Intel has released a 3G cellular modem with an integrated power amplifier that fits into a 300 mm2 footprint, claiming it…

More...
Braswell 14nm Atom slips to Q2 15

Braswell 14nm Atom slips to Q2 15

It's not all rosy in the house of Intel. It seems that upcoming Atom out-of-order cores might be giving this semiconductor…

More...
TSMC 16nm wafers coming in Q1 2015

TSMC 16nm wafers coming in Q1 2015

TSMC will start producing 16nm wafers in the first quarter of 2015. Sometime in the second quarter production should ramp up…

More...
Skylake-S LGA is 35W to 95W TDP part

Skylake-S LGA is 35W to 95W TDP part

Skylake-S is the ‘tock’ of the Haswell architecture and despite being delayed from the original plan, this desktop part is scheduled…

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 10 October 2011 09:23

US drones catch a virus

Written by Nick Farell



Logging key strokes

US Predator and Reaper drones have been hit by a computer virus that is logging the keystrokes of pilots as they steer the UAVs remotely through Afghanistan and other warzones.

Wired reports how security researcher Miles Fidelman, thinks that the virus may be an internal Department of Defense (DoD) security monitoring package. He said that there are a couple of vendors who sell such technology to the DoD, which are rootkits that do key logging.

It might be that the virus that folks are fighting is something that some other part of DoD deployed intentionally, Fidelman adds. The virus hit the “cockpits” of the pilots computer stations at Nevada’s Creech Air Force Base. It was first detected by the military’s Host-Based Security System close to two weeks ago.

The military tried removing it several times, but it keeps coming back. Still, it doesn’t seem to have stopped them from continuing their missions, and no classified data has been taken.

More here.

 

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments