According to a whitepaper by penetration testing firm IOActive, satellites can be hijacked by attackers using booby-trapped SMS text messages and other techniques. The vulnerabilities found could allow adversaries to completely disrupt mission-critical communication networks.
How can satellite vendors fix these vulnerabilities?
Listen to episode 140 of our Security Slice podcast and hear Lamar Bailey, Craig Young, Tyler Reguly, Ken Westin and Dwayne Melancon discuss the impact of critical vulnerabilities in embedded firmware, how to change the cost/risk equation of critical infrastructure security, and who should be legally responsible for responding to vulnerability disclosures.
Click Here to Listen to the Podcast
- Security Slice: The Heartbleed Headache Continues
- Security Slice: Encryption Equality Issues
- Security Slice: Snake Oil in the App Store
- Security Slice: Heartbleed Heartbreak
The Executive’s Guide to the Top 20 Critical Security Controls
Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].
Title image courtesy of ShutterStock