Security Testing’s Missing Link and the Revelation of Drone Images

Why are so many computer and network applications breached? And in seemingly simple ways? A recent featured article appeared at the top of the first page of the December 17, 2009 edition of the Wall Street Journal – that dreaded space from which security professionals are tasked with avoiding their organizations and their executives from appearing. It was about the interception by militants in Iraq of the videos from U.S. Predator drones. The article, which is by Siobhan Gorman, Yochi J. Dreasen and August Cole, has the title “Insurgents Hack U.S. Drones: $26 Software Is Used to Breach Key Weapons in Iraq; Iranian Backing Suspected.” The primary message of the article is that “U.S. adversaries continue to find simple ways to counteract sophisticated military technologies.”

Post a Comment

Your email is never published nor shared. Required fields are marked *

*
*