DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

Why the Drones are Clear and Present Danger & Cybersecurity Concern

DigitalCIO Bureau by DigitalCIO Bureau
October 14, 2019
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

The increase usage of cybercriminals using drones as a part of their cyber-attacks is a clear and present danger. Read on to know more…

Gone are the days when drones are used exclusively by the military to target adversaries across the border. Drones, which are part of the UAV (Unnamed Aerial Vehicles) group, have certainly seen an increase in popularity in the past few years.

With drones costing from as little as $40 to $10,000 or more for specialist professional models, they can be used for any purpose. The usage of drones has gone beyond just military purposes as filmmaking, photography, and surveillance are among the many industries that are deploying drones for multiple purposes. The increase in usage has led to cybercriminals using drones as a part of their attacks.

Cybersecurity Concerns
Drones are disruptive by their nature, not least because they bring a rapid reduction in the skills operators need and one can crash an old-style remote control plane in few seconds even without any training. Low cost and easy to use, drones can deliver a “payload” to carry out surveillance, to capture data, or to disrupt networks. Making matters worse, drones are hard to detect and defeat.

One of the biggest concerns is that drones can be hacked, or other drones can be used to hack electronic devices and gather data without one’s consent. The advent of unmanned aerial vehicle technologies has posed unique challenges to the air campaigners and cybersecurity experts. In other words, drones are quickly becoming a cybersecurity nightmare. Security experts warn that hacked drones are breaching physical and cyberdefenses to cause disruption and steal data. Hackers have become potent in combining anti-cyberdefense with expertise in intelligence gathering and unmanned aerial vehicles.

Hackers may employ drones as spying devices to collect data. With an advanced microphone, they can also eavesdrop on conversations. This can affect the privacy of citizens as well as collect data from confidential government locations. Fake signals can be fed that tamper with the Global Positioning System (GPS) of the drones and this can cause massive impacts for military drones. Small computers can be attached to drones to exploit WiFi, Bluetooth, or Radio-Frequency IDentification (RFID) vulnerabilities in restricted areas.

Challenges
Unfortunately for the defenders, drones are hard to spot, and even harder to disrupt. Drone features that appeal to consumer and professional operators make them a difficult target: They are smaller and quiet, and designed to overcome radio frequency interference making them hard to detect.

Technically speaking, drones have low acoustic and thermal signatures, and also low-power RF transmitters and on a radar they look like birds, and by default Air Traffic Control (ATC) radars are designed to ignore birds.

Lasers, jamming or even lower-tech measures such as using a sniper to bring down a drone raise other issues, especially over populated areas and airports.

Common Counter Measures
Cybersecurity researchers are working on ways to detect malicious drones. Some of the measures include:

• Deploying radio-frequency scanners that look for specific transmissions from drones.
• Acoustic sensors that match the drone sound against a signature database for a match
• Geofencing that involves setting up a virtual border around a physical location to detect when drones enter the marked area.

These methods come with their own set of drawbacks. There are several other methods available to detect malicious drones.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

SoftBank Acquires DigitalBridge for $4 billion

by DigitalCIO Bureau
January 2, 2026
0
CRISIL To Acquire Bridge To India Energy

SoftBank Group has entered into a definitive agreement to acquire DigitalBridge Group, a leading global alternative asset manager dedicated to investing in digital infrastructure, including data centers, cell...

Read moreDetails

Barracuda Research Identifies GhostFrame Phishing Kit

by DigitalCIO Bureau
December 23, 2025
0
Barracuda Introduces ‘Barracuda Research

Barracuda has published details of a new, evasive and stealthy phishing-as-a-service (PhaaS) kit that hides its malicious content in web page iframes to bypass detection and maximise flexibility....

Read moreDetails

Arctic Wolf Snaps up UpSight Security

by DigitalCIO Bureau
November 6, 2025
0
CRISIL To Acquire Bridge To India Energy

Security company Arctic Wolf has acquired UpSight Security to enhance its Aurora Endpoint Security solution with AI-driven features for ransomware prevention and rollback recovery. Through the acquisition of UpSight Security,...

Read moreDetails

Vanguard Launches Global Technology Center in Hyderabad

by DigitalCIO Bureau
November 4, 2025
0
Vanguard Launches Global Technology Center in Hyderabad

Vanguard has launched its Global Technology Center in Hyderabad, marking a significant milestone in the firm’s technology transformation. The new office reflects Vanguard’s recognition of India as a...

Read moreDetails

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails
Next Post

Stalkerware installation attempts up by 35% in 2019 - Report

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Ascendion Leads The Charge in Generative AI

Ascendion Leads The Charge in Generative AI

August 3, 2024

Google announces new web domain for developers

February 20, 2019

Rajan Bhandari advanced as CEO of Hitachi Systems Micro Clinic India

May 31, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?