US Air Force Will Allow Hackers To Target Its Satellite By Any Means
Anil
For the US government, relying on hackers to find security bugs is not something weird.
- 3.2 Billion Email And Password Pairs Have Been Leaked, Here's How To Check If You Are Affected
- Watch This Man Hack 26 iPhones At The Same Time Without Even Touching Them
- Hackers Purposely Upload Their Fingerprints To Crime Scene - One Of The Dumbest Hacks Ever
At the annual hacking conference "DEF CON 27", the US Air Force talked up about its data system from F-15 fighter aircraft. Aside from that, they also posed a challenge for security professionals in addressing system vulnerabilities. This is the first time experts outside the US Air Force have been allowed to access a military system for "hacking" purposes.
In a two-day period, seven security hackers found out several fatal flaws that likely intended to cripple the data system of Trusted Aircraft Information Download Station. However, the US Air Force previously anticipated such outcomes when these hackers could make use of several back doors that they had already known, according to a US Air Force official.
It seems that the US Air Force officials have realized the presence of security exploits after years of neglecting security issues. Therefore, they would expect the security bugs to be cleaned and eliminated as soon as possible. Because the military system software is made by contractors, they might not want their products to have any room for improvement in the testing phase.
It is understandable that many countries did not tend to share their innovations and technological developments like what happened during the Cold War. But now, keeping an open-minded attitude regarding technological development and advance seems to be much beneficial for countries than ever.
For the US government, relying on hackers to find security bugs is not something weird. For instance, the "Hack the Air Force/Military/Pentagon" competitions have helped the officials to gain intensive insights and deep understanding of cybersecurity issues that individual organizations may encounter during their operations.
According to Wired, the US Air Force is also preparing for DEF CON 28 as they will continue to let hackers approach a satellite of the U.S. Defense Department in any possible way. The goal of this action, reported by Will Roper, is to get access to a satellite-mounted camera and retrieve lunar imagery data then ultimately win the 'bug bounty' award.
Featured Stories
ICT News - Mar 05, 2026
X Platform Implements Strict Measures Against Fake AI-Generated Videos Amid Iran...
How To - Mar 04, 2026
Getting Started with AI: A Newbie's Simple Guide
ICT News - Mar 03, 2026
Budget Entry-Level PCs Under $500 to Vanish by 2028 Due to Memory Price Surge
ICT News - Mar 02, 2026
IDC Report Predicts Surging Smartphone Prices Due to Global RAM Shortage
ICT News - Mar 01, 2026
Samsung Links Galaxy S26 Price Hikes to AI Memory Supply Issues
ICT News - Feb 28, 2026
Anthropic Blacklisted by US Department of War: Trump Orders Federal Ban Over AI...
ICT News - Feb 26, 2026
AI Models Frequently Resort to Nuclear Escalation in Simulated Crises, Study...
ICT News - Feb 23, 2026
It's Over for Xbox: Asha Sharma Takes Over to Ruin Microsoft Gaming with AI
ICT News - Feb 22, 2026
Which AI Model Excels at Which Task in 2026: A Comprehensive Guide
ICT News - Feb 21, 2026
AI Coding Agent Causes Major AWS Outage at Amazon
Read More
Gadgets- Mar 08, 2026
Best Budget Keyboards of 2026
These budget keyboards prove that you don't need to spend hundreds for a quality typing experience in 2026.
Mobile- Mar 08, 2026
Transforming Android: New Desktop Mode Makes Phones PC-Capable
This update marks an exciting era for Android, empowering users to do more with their everyday devices.