Featured Articles

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC has announced that it will begin volume production of 16nm FinFET products in the second half of 2015, in late…

More...
AMD misses earnings targets, announces layoffs

AMD misses earnings targets, announces layoffs

AMD has missed earnings targets and is planning a substantial job cuts. The company reported quarterly earnings yesterday and the street is…

More...
Did Google botch the Nexus 6 and Nexus 9?

Did Google botch the Nexus 6 and Nexus 9?

As expected, Google has finally released the eagerly awaited Nexus 6 phablet and its first 64-bit device, the Nexus 9 tablet.

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Tuesday, 05 August 2014 12:48

Hackers can control your airplane

Written by Nick Farrell



Wi-Fi security holes

A hacker can take control of a plane using a mobile device and a wi-fi connection, according to a security expert. Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems.

Santamarta who works for IOActive, is scheduled to lay out the technical details of his research at this week's Black Hat hacking conference in Las Vegas later this week. His subject is vulnerabilities in the satellite communications systems used in aerospace and other industries.

"These devices are wide open. The goal of this talk is to help change that situation," Santamarta, said.

He discovered by "reverse engineering" the firmware, used to operate communications equipment made by Cobham, Harris, EchoStar, Iridium Communications and Japan Radio he could use the inflight entertainment system to hack into its avionics equipment. He has only tested his hacks in IOActive's Madrid laboratory, and admits they might be difficult to replicate in the real world. Cobham, Harris, Hughes and Iridium said they had reviewed Santamarta's research and confirmed some of his findings.

However Cobham, whose Aviation 700 aircraft satellite communications equipment was the focus of Santamarta's research, said it is not possible for hackers to use WiFi signals to interfere with critical systems that rely on satellite communications for navigation and safety. The hackers must have physical access to Cobham's equipment, according to Cobham spokesman. 

Harris spokesman Jim Burke said the company had reviewed Santamarta's paper but thought the risk was tiny.

One vulnerability that Santamarta said he found in equipment from all five manufacturers was the use of "hardcoded" log-in credentials, which are designed to let service technicians access any piece of equipment with the same login and password.
The problem is that hackers can retrieve those passwords by hacking into the firmware, then use the credentials to access sensitive systems, Santamarta said.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments