DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

Why the Drones are Clear and Present Danger & Cybersecurity Concern

DigitalCIO Bureau by DigitalCIO Bureau
October 14, 2019
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

The increase usage of cybercriminals using drones as a part of their cyber-attacks is a clear and present danger. Read on to know more…

Gone are the days when drones are used exclusively by the military to target adversaries across the border. Drones, which are part of the UAV (Unnamed Aerial Vehicles) group, have certainly seen an increase in popularity in the past few years.

With drones costing from as little as $40 to $10,000 or more for specialist professional models, they can be used for any purpose. The usage of drones has gone beyond just military purposes as filmmaking, photography, and surveillance are among the many industries that are deploying drones for multiple purposes. The increase in usage has led to cybercriminals using drones as a part of their attacks.

Cybersecurity Concerns
Drones are disruptive by their nature, not least because they bring a rapid reduction in the skills operators need and one can crash an old-style remote control plane in few seconds even without any training. Low cost and easy to use, drones can deliver a “payload” to carry out surveillance, to capture data, or to disrupt networks. Making matters worse, drones are hard to detect and defeat.

One of the biggest concerns is that drones can be hacked, or other drones can be used to hack electronic devices and gather data without one’s consent. The advent of unmanned aerial vehicle technologies has posed unique challenges to the air campaigners and cybersecurity experts. In other words, drones are quickly becoming a cybersecurity nightmare. Security experts warn that hacked drones are breaching physical and cyberdefenses to cause disruption and steal data. Hackers have become potent in combining anti-cyberdefense with expertise in intelligence gathering and unmanned aerial vehicles.

Hackers may employ drones as spying devices to collect data. With an advanced microphone, they can also eavesdrop on conversations. This can affect the privacy of citizens as well as collect data from confidential government locations. Fake signals can be fed that tamper with the Global Positioning System (GPS) of the drones and this can cause massive impacts for military drones. Small computers can be attached to drones to exploit WiFi, Bluetooth, or Radio-Frequency IDentification (RFID) vulnerabilities in restricted areas.

Challenges
Unfortunately for the defenders, drones are hard to spot, and even harder to disrupt. Drone features that appeal to consumer and professional operators make them a difficult target: They are smaller and quiet, and designed to overcome radio frequency interference making them hard to detect.

Technically speaking, drones have low acoustic and thermal signatures, and also low-power RF transmitters and on a radar they look like birds, and by default Air Traffic Control (ATC) radars are designed to ignore birds.

Lasers, jamming or even lower-tech measures such as using a sniper to bring down a drone raise other issues, especially over populated areas and airports.

Common Counter Measures
Cybersecurity researchers are working on ways to detect malicious drones. Some of the measures include:

• Deploying radio-frequency scanners that look for specific transmissions from drones.
• Acoustic sensors that match the drone sound against a signature database for a match
• Geofencing that involves setting up a virtual border around a physical location to detect when drones enter the marked area.

These methods come with their own set of drawbacks. There are several other methods available to detect malicious drones.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails

Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

by DigitalCIO Bureau
September 1, 2025
0
Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

Qlik has announced growing enterprise adoption of Qlik Answers, as companies across sectors move beyond AI prototypes and into business-critical deployment. Built for real-world complexity, Qlik Answers allows organizations to extract intelligence...

Read moreDetails

Google’s AI bug finder has found 20 vulnerabilities

by DigitalCIO Bureau
August 6, 2025
0
Kaspersky Unveils Guidelines For Secure AI Deployment At IGF 2024

Google has found and reported twenty vulnerabilities in various popular open-source projects through an AI-powered bug finder. The "researcher," dubbed Big Sleep, was introduced in November last year....

Read moreDetails

Qlik Cloud Analytics available through AWS Marketplace

by DigitalCIO Bureau
July 21, 2025
0
Qlik Cloud Analytics available through AWS Marketplace

Qlik has announced the availability of Qlik Cloud Analytics in the new AI Agents and Tools category of AWS Marketplace. Customers can now use AWS Marketplace to easily...

Read moreDetails

KnowBe4 Releases AI-Driven Prevent To Tackle Outbound Email Risk

by DigitalCIO Bureau
July 19, 2025
0
Barracuda Networks Updates Email Security Suite

KnowBe4 has announced the release of KnowBe4 Prevent across all market segments – an AI-driven email security product designed to enable organizations to manage the problem of outbound...

Read moreDetails
Next Post

Stalkerware installation attempts up by 35% in 2019 - Report

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Tata Elxsi, Telefónica achieve automation of cloud infra for telecoms

Edelweiss Global Markets harnesses automation by using the Nutanix cloud platform

March 23, 2024

Only 5-10% pharma firms have cybersecurity: Expert

August 31, 2019

India drives us to roll out WhatsApp Pay globally: Mark Zuckerberg

January 30, 2020

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?