Hacker demonstrates how to hijack an airplane using an Android app
April 11, 2013 10:47 AM   Subscribe

Hacker demonstrates how to hijack an airplane using an Android app

Teso, a trained commercial pilot for 12 years, reiterated that the Automated Dependent Surveillance-Broadcast (ADS-B) is unencrypted and unauthenticated which can lead to passive attacks like eavesdropping or active attacks such as message jamming and injection. Furthermore, the Aircraft Communications Addressing and Reporting System (ACARS) – a service used to send text-based messages between aircraft and ground stations - also has no security.
posted by KokuRyu (1 comment total)

This post was deleted for the following reason: Double. -- jessamyn



 
Double
posted by k5.user at 10:48 AM on April 11, 2013 [1 favorite]


« Older Cardinal Perplexogram   |   Blinking lights convey so much filler Newer »


This thread has been archived and is closed to new comments