- Sputnik International
World
Get the latest news from around the world, live coverage, off-beat stories, features and analysis.

Drone Armed With Hacking Weapons Blows Minds at Def Con

© AFP 2023 / GLENN CHAPMAN An Aerial Assault drone is displayed during a Def Con hacker gathering August 9, 2015 in Las Vegas
An Aerial Assault drone is displayed during a Def Con hacker gathering August 9, 2015 in Las Vegas - Sputnik International
Subscribe
A drone capable of cracking wireless networks at close range was presented Sunday at the notorious Def Con hacker conference in Las Vegas.

US-based Aerial Assault brought its newest gadget to wow the Def Con audience: a cutting edge unmanned aerial vehicle (UAV) equipped with weapons for network invasion, capable of breaching security while airborne or after landing atop a building, Agence France-Presse reported.

"There has never been this capability before," Aerial Assault’s David Jordan told AFP.

Pentagon - Sputnik International
Russia Blamed for Pentagon Hack, Once Again, Without Evidence
The weapon itself is specially targeted software that enables it search and identify any network vulnerabilities, which can be used to gain access into loosely secured data, whether commercial or personal, exchanged through network channels.

The drone is able to fly and scan for unsecured wireless connections into networks, Jordan commented. It can also transfer GPS coordinates and other information from a targeted object back to its operation base.

The suggested price for the hacker drone is $2,500.

At the same Def Con event, security researchers Kevin Mahaffey, chief technology officer of Lookout, and Marc Rogers, principal security researcher at Cloudflare, demonstrated flaws in the Tesla Model S electric car security system which could allow hackers to take control of the vehicle.

In response, Tesla promptly released a security patch.

A reported General Motors car system hack last week came on the heels of news that a 2015 Jeep Cherokee was easily taken under remote control using its cellular connection by IT security techs.

Newsfeed
0
To participate in the discussion
log in or register
loader
Chats
Заголовок открываемого материала