Skip to content ↓ | Skip to navigation ↓

According to a whitepaper by penetration testing firm IOActive,  satellites can be hijacked by attackers using booby-trapped SMS text messages and other techniques. The vulnerabilities found could allow adversaries to completely disrupt mission-critical communication networks.

How can satellite vendors fix these vulnerabilities?

Listen to episode 140 of our Security Slice podcast and hear Lamar BaileyCraig Young, Tyler Reguly, Ken Westin and Dwayne Melancon discuss the impact of  critical vulnerabilities in embedded firmware, how to change the cost/risk equation of critical infrastructure security, and who should be legally responsible for responding to vulnerability disclosures.

Click Here to Listen to the Podcast


More Podcasts:



picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].


Title image courtesy of ShutterStock