Featured Articles

Snapdragon 400 is Qualcomm’s SoC for watches, wearables

Snapdragon 400 is Qualcomm’s SoC for watches, wearables

We wanted to learn a bit more about Qualcomm's plans for wearables and it turns out that the company believes its…

More...
Qualcomm sampling 20nm Snapdragon 810

Qualcomm sampling 20nm Snapdragon 810

We had a chance to talk to Michelle Leyden-Li, Senior Director of Marketing, QCT at Qualcomm and get an update on…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Friday, 15 February 2013 11:07

Zombies put fear of god in US

Written by Nick Farrell



Brainless Civil Defense can’t protect themselves

Earlier this week we ran a yarn about how a hacker took out a US television channel’s emergency broadcast story and ran a fake broadcast about Zombies rising from their graves. But a typical hack which was amusing at the time, is being taken as seriously as a terrorist attack by the humourless US.

The problem is not Zombies so much as the fact that the attack showed how pathetic the civil defence IT system was. Security experts said the equipment used by the Emergency Alert System remained vulnerable when stations allow it be accessed via the public internet. What is worrying them is that during a real disaster a foreign power or terror group could use the same attack vector to cause more damage.

Karole White, president of the Michigan Association of Broadcasters said that it was not what the hackers said. It is the fact that they got into the system. They could have caused some real damage. It was believed the hackers were able to get in because TV stations had not changed the default passwords they used when the equipment was first shipped from the manufacturer.

Broadcasters were ordered to change the passwords for the EAS equipment, but Mike Davis, a hardware security expert with IOActive Labs said that would not stop the hackers, who could get past the password protection scheme.
The FCC ordered the telly stations to check systems to ensure that hackers had not queued "unauthorised alerts" for future transmission.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments