Featured Articles

Analyst reveals Apple Watch spec

Analyst reveals Apple Watch spec

An analyst has examined the Apple Watch supply chain in an effort to ascertain the exact spec of Cupertino’s new gadget…

More...
Nvidia's first 20nm product is a mobile SoC

Nvidia's first 20nm product is a mobile SoC

For much of the year we were under the impression that the second generation Maxwell will end up as a 20nm…

More...
Nvidia GTX 980 reviewed

Nvidia GTX 980 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Nvidia adjusts GTX 980 and GTX 970 pricing

Nvidia adjusts GTX 980 and GTX 970 pricing

It appears that Nvidia has been feeling the pulse of the market and took some note from comments regarding the original…

More...
PowerColor TurboDuo R9 285 reviewed

PowerColor TurboDuo R9 285 reviewed

Today we will take a look at the PowerColor TurboDuo Radeon R9 285. The card is based on AMD’s new…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 10 October 2011 09:23

US drones catch a virus

Written by Nick Farell



Logging key strokes

US Predator and Reaper drones have been hit by a computer virus that is logging the keystrokes of pilots as they steer the UAVs remotely through Afghanistan and other warzones.

Wired reports how security researcher Miles Fidelman, thinks that the virus may be an internal Department of Defense (DoD) security monitoring package. He said that there are a couple of vendors who sell such technology to the DoD, which are rootkits that do key logging.

It might be that the virus that folks are fighting is something that some other part of DoD deployed intentionally, Fidelman adds. The virus hit the “cockpits” of the pilots computer stations at Nevada’s Creech Air Force Base. It was first detected by the military’s Host-Based Security System close to two weeks ago.

The military tried removing it several times, but it keeps coming back. Still, it doesn’t seem to have stopped them from continuing their missions, and no classified data has been taken.

More here.

 

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments