US Air Force Will Allow Hackers To Target Its Satellite By Any Means
Anil
For the US government, relying on hackers to find security bugs is not something weird.
- 3.2 Billion Email And Password Pairs Have Been Leaked, Here's How To Check If You Are Affected
- Watch This Man Hack 26 iPhones At The Same Time Without Even Touching Them
- Hackers Purposely Upload Their Fingerprints To Crime Scene - One Of The Dumbest Hacks Ever
At the annual hacking conference "DEF CON 27", the US Air Force talked up about its data system from F-15 fighter aircraft. Aside from that, they also posed a challenge for security professionals in addressing system vulnerabilities. This is the first time experts outside the US Air Force have been allowed to access a military system for "hacking" purposes.
In a two-day period, seven security hackers found out several fatal flaws that likely intended to cripple the data system of Trusted Aircraft Information Download Station. However, the US Air Force previously anticipated such outcomes when these hackers could make use of several back doors that they had already known, according to a US Air Force official.
It seems that the US Air Force officials have realized the presence of security exploits after years of neglecting security issues. Therefore, they would expect the security bugs to be cleaned and eliminated as soon as possible. Because the military system software is made by contractors, they might not want their products to have any room for improvement in the testing phase.
It is understandable that many countries did not tend to share their innovations and technological developments like what happened during the Cold War. But now, keeping an open-minded attitude regarding technological development and advance seems to be much beneficial for countries than ever.
For the US government, relying on hackers to find security bugs is not something weird. For instance, the "Hack the Air Force/Military/Pentagon" competitions have helped the officials to gain intensive insights and deep understanding of cybersecurity issues that individual organizations may encounter during their operations.
According to Wired, the US Air Force is also preparing for DEF CON 28 as they will continue to let hackers approach a satellite of the U.S. Defense Department in any possible way. The goal of this action, reported by Will Roper, is to get access to a satellite-mounted camera and retrieve lunar imagery data then ultimately win the 'bug bounty' award.
Featured Stories
ICT News - Jul 05, 2025
Windows 11 is Now the Most Popular Desktop OS in the World
ICT News - Jul 02, 2025
All About Florida’s Alligator Alcatraz: A Smart Move for Immigration Control
ICT News - Jun 25, 2025
AI Intimidation Tactics: CEOs Turn Flawed Technology Into Employee Fear Machine
ICT News - Jun 24, 2025
Tesla Robotaxi Finally Hits the Streets: $4.20 Rides That'll Make You Hold Your...
ICT News - Jun 24, 2025
World's First Flying Humanoid Robot Takes Flight
ICT News - Jun 24, 2025
When Closed Source Met Open Source: Bill Gates Finally Meets Linus Torvalds After...
Gadgets - Jun 23, 2025
COLORFUL SMART 900 AI Mini PC: Compact Power for Content Creation
ICT News - Jun 22, 2025
Neuralink Telepathy Chip Enables Quadriplegic Rob Greiner to Control Games with...
ICT News - Jun 20, 2025
Tesla vs Zoox vs Waymo: Who would win?
ICT News - Jun 19, 2025