Remove Access Remove Communications Remove Military Remove Workshop
article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

FOX: Roberts: You basically have to understand how computer networks work, how avionics systems work, and then be able to translate communicate between those systems We've primarily focused on physically being in the airplane and hooking up to inflight entertainment. One of the biggest risks is physical access to an airplane.

article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

Some, like Adam Van Prooyan, just kind of wandered into that path, in part because he was interested in computers, and also because the West Point Military Academy just happened to have a CTF team that competes in the annual Cyberstakes competition. Vamosi: So, not everyone is in a military academy. Cyber 600 and that was.

article thumbnail

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

The chips were alleged to have spied on users of the devices and sent unspecified data back to the Chinese military. We don’t often hear about intentional efforts to subvert the security of the technology supply chain simply because these incidents tend to get quickly classified by the military when they are discovered.