Internet Industry Search Engine & News

Cool Cool Cool Oversight Office Says It's Incredibly Easy To Hack The Defense Dept.'s Weapons Systems


Oct 11, 2018 12:46 PM - 1+ week ago

Description: holy_shit(1).pdf [PDF]: In operational testing, DOD routinely found mission-critical cyber vulnerabilities in systems that were under development, yet program officials GAO met with believed their systems were secure and discounted some test results as unrealistic. Using relatively simple tools and techniques, testers were able to take control of systems and largely operate undetected, due in part to basic issues such as poor password management and unencrypted communications. Terrified/horrified yet? In addition, vulnerabilities that DOD is aware of likely represent a fraction of total vulnerabilities due to testing limitations. The Government Accountability Office's report contains nearly no good news. Just bad news on top of bad news with the chilling reminder that these are weapons systems so a malicious attack could do more than damage systems or exfiltrate sensitive data. It could actually kill people. Why is the Defense Department's… um… defense in such shoddy shape? Well, it didn't get that way overnight. It took literally ...

Read The Article

Search Builder: (Click to add search terms to search box)
test team  weapons systems  nexus point  Better judgment isn   defense  Defense Department  networked nature  damage systems  test report  DOD weapons  DOD weapon systems  penetration testing programs  password management  cybersecurity oversight  weapon systems  weapon system  weapon capabilities  test teams  system data  Other data  safety concerns  cybersecurity programs  DOD systems  war isn  penetration testing  systems weren  officials couldn  source software  DOD isn  security warnings  DOD employees  Other tests  contractor error  mass destruction  weapon components  commandeer weapons  security holes  world powers  accounting systems  patch vulnerabilities  unencrypted communications  GAO points  government agencies  prioritize cybersecurity  cyber capabilities  defense systems  United States  computer hardware  
Contextual Tweet Search Results:

Contextual Search Results

**The content you see on this website is the sole responsibility of the entity that made it available, which may not be (4Internet,LLC). Content contained on this site is provided on an “as is” basis. We make no commitments regarding the content and we don't review it, so don't assume that we do. What you see here may not be accurate and you should not rely upon it. The content does not necessarily represent the views and opinions of 4Internet. You use this service and everything you see here at your own risk. Content displayed may be subject to copyright. Content is removed on a case by case basis. To request that content be removed, contact us using the following form: Contact Us. 4Internet LLC, and the people who work with it, will not be liable for any damages.