DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

Why the Drones are Clear and Present Danger & Cybersecurity Concern

DigitalCIO Bureau by DigitalCIO Bureau
October 14, 2019
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

The increase usage of cybercriminals using drones as a part of their cyber-attacks is a clear and present danger. Read on to know more…

Gone are the days when drones are used exclusively by the military to target adversaries across the border. Drones, which are part of the UAV (Unnamed Aerial Vehicles) group, have certainly seen an increase in popularity in the past few years.

With drones costing from as little as $40 to $10,000 or more for specialist professional models, they can be used for any purpose. The usage of drones has gone beyond just military purposes as filmmaking, photography, and surveillance are among the many industries that are deploying drones for multiple purposes. The increase in usage has led to cybercriminals using drones as a part of their attacks.

Cybersecurity Concerns
Drones are disruptive by their nature, not least because they bring a rapid reduction in the skills operators need and one can crash an old-style remote control plane in few seconds even without any training. Low cost and easy to use, drones can deliver a “payload” to carry out surveillance, to capture data, or to disrupt networks. Making matters worse, drones are hard to detect and defeat.

One of the biggest concerns is that drones can be hacked, or other drones can be used to hack electronic devices and gather data without one’s consent. The advent of unmanned aerial vehicle technologies has posed unique challenges to the air campaigners and cybersecurity experts. In other words, drones are quickly becoming a cybersecurity nightmare. Security experts warn that hacked drones are breaching physical and cyberdefenses to cause disruption and steal data. Hackers have become potent in combining anti-cyberdefense with expertise in intelligence gathering and unmanned aerial vehicles.

Hackers may employ drones as spying devices to collect data. With an advanced microphone, they can also eavesdrop on conversations. This can affect the privacy of citizens as well as collect data from confidential government locations. Fake signals can be fed that tamper with the Global Positioning System (GPS) of the drones and this can cause massive impacts for military drones. Small computers can be attached to drones to exploit WiFi, Bluetooth, or Radio-Frequency IDentification (RFID) vulnerabilities in restricted areas.

Challenges
Unfortunately for the defenders, drones are hard to spot, and even harder to disrupt. Drone features that appeal to consumer and professional operators make them a difficult target: They are smaller and quiet, and designed to overcome radio frequency interference making them hard to detect.

Technically speaking, drones have low acoustic and thermal signatures, and also low-power RF transmitters and on a radar they look like birds, and by default Air Traffic Control (ATC) radars are designed to ignore birds.

Lasers, jamming or even lower-tech measures such as using a sniper to bring down a drone raise other issues, especially over populated areas and airports.

Common Counter Measures
Cybersecurity researchers are working on ways to detect malicious drones. Some of the measures include:

• Deploying radio-frequency scanners that look for specific transmissions from drones.
• Acoustic sensors that match the drone sound against a signature database for a match
• Geofencing that involves setting up a virtual border around a physical location to detect when drones enter the marked area.

These methods come with their own set of drawbacks. There are several other methods available to detect malicious drones.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Vats Srivatsan named Interim CEO of WatchGuard Technologies

by DigitalCIO Bureau
May 8, 2025
0
Vats Srivatsan named Interim CEO of WatchGuard Technologies

WatchGuard Technologies Chief Executive Officer (CEO) Prakash Panjwani will transition out of his operational role, continuing to serve on the Board of Directors and as a strategic advisor...

Read moreDetails

Google 2024 Ads Safety Report: AI plays key role in safer advertising ecosystem

by DigitalCIO Bureau
April 19, 2025
0
Google 2024 Ads Safety Report: AI plays key role in safer advertising ecosystem

Google has released its 2024 Ads Safety Report, demonstrating how it is using advanced AI technology to create a safe and responsible advertising ecosystem. A notable finding from...

Read moreDetails

Proofpoint Named a Leader in 2024 Gartner Magic Quadrant

by DigitalCIO Bureau
December 26, 2024
0
Proofpoint Named a Leader in 2024 Gartner Magic Quadrant

Proofpoint announced it has been named a Leader in the 2024 Gartner Magic Quadrant for Email Security Platforms. The Gartner Magic Quadrant for Secure Email Gateways was last published in...

Read moreDetails

Tenable Adds New Features To Security Center

by DigitalCIO Bureau
December 20, 2024
0
Tenable Appoints Shai Morag As Chief Product Officer

Tenable has announced new vulnerability intelligence, risk prioritization and web application scanning features for Tenable Security Center, the world’s #1 vulnerability management solution managed on-premises. Tenable Security Center identifies, investigates...

Read moreDetails

Commvault Unveils innovation facility in Coimbatore

by DigitalCIO Bureau
November 12, 2024
0
Commvault Unveils innovation facility in Coimbatore

Commvault announced the launch of an advanced, facility in Coimbatore, Tamil Nadu. This facility, which complements Commvault’s existing operations in Bangalore and strengthens the company’s presence in India,...

Read moreDetails
Next Post

Stalkerware installation attempts up by 35% in 2019 - Report

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

GajShield Infotech unleashes the power of AI to safeguard against dynamic cyber threat

GajShield Infotech unleashes the power of AI to safeguard against dynamic cyber threat

February 16, 2024
Infosys: Over $300 billion In Corporate Cloud Commitments Remain Untapped

Infosys: Over $300 billion In Corporate Cloud Commitments Remain Untapped

September 12, 2023
Acronis Named a Leader in IDC MarketScape for Cyber Recovery

Acronis Named a Leader in IDC MarketScape for Cyber Recovery

December 2, 2023

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Nutanix Palo Alto Networks Panel Discussion Qlik Salesforce Schneider Electric ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?