AMU Cyber & AI

Intel Security Predicts ‘Dronejacking’

Drone hacking, hijacking are concerns

What’s in store for 2017? Drone hacking and drone hijacking–or just dronejacking for short–according to Intel Security.

The IT security firm recently listed drones on its list of [link url=”https://amuedge.com/hackable-holiday-gifts-revealed/” title=”most hackable gifts”] for the recent holiday season. In fact, drones came in as the fifth most “hackable” category of gifts.

The largest concerns surrounding drones involve disrupting GPS signals and/or hijacking of the drone. Cyber criminals could theoretically hijack unsecured drones and take advantage in a couple of different ways. Through hijacking and taking over the GPS of a drone, criminals could then either use the drone for illicit purposes or simply direct the drone to a new location to gain access to what it is carrying.

Package deliveries a major concern

With big retail companies like Amazon and shipping companies like UPS considering using drones for package delivery, concerns over dronejacking are more prevalent than ever as 2017 approaches.

If cyber criminals can disrupt a drone while in the midst of a delivery, they could easily make off with stolen goods.

IoT Often a Major Security Risk

The Internet of Things (IoT) is under heavy scrutiny of late, and consumer drones often fall into the IoT category.

A [link url=”https://amuedge.com/report-consumers-not-properly-securing-gadgets/” title=”recent study”] found that of those who receive IoT gifts, 79 percent plan to begin using the devices or gadgets within the first day.

However, just 42 percent stated intention to take proper security measures with the new devices or gadgets. And even those who do plan to attempt to take proper security measures may not successfully do so. About 47 percent of consumers stated uncertainty when it came to securing IoT devices.

[relink url=”https://amuedge.com/hackable-holiday-gifts-revealed/” url2=”https://amuedge.com/symantec-iot-devices-heavily-targeted-hackers/”]

Comments are closed.