FAA: Boeing?s New 787 May Be Vulnerable to Hacker Attack


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Complex Event Processing RSS News FAA: Boeing?s New 787 May Be Vulnerable to Hacker Attack
# 1  
Old 01-06-2008
FAA: Boeing?s New 787 May Be Vulnerable to Hacker Attack

by Kim Zetter, WIRED Boeing’s new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane’s control systems, according to the U.S. Federal Aviation Administration. The computer network in the Dreamliner’s passenger compartment, designed to give passengers in-flight internet access, is connected to the [...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. Debian

Vulnerable to symlink attack notice while trying to upgrade lighttpd.

I got this while I tried to upgrade my server and have been unable to find any explanations for what I could do while I have searched after an solution. I were an bit uncertain about how to search for an answer and have tried with some searches that I think should have been good enough as well with... (2 Replies)
Discussion started by: Jonathan Sander
2 Replies

2. What is on Your Mind?

I want to be a white-hat hacker!

HI, i want to be a white hacker(those who use their skills in ethical hacking) for that what all languages do i need to know i am working in an IT company and its paying me well, i just want to learn it because it has always attracted me..i know c,c++,shell,little bit html what else do... (13 Replies)
Discussion started by: shekhar_4_u
13 Replies

3. AIX

Powerha on P595 and Blade HX5 Type 787

Hello Everyobdy! Is it poosible to implement PowerHa on Different Server like power 595 and Blade HX5 Type 787 Thanks in Advance (8 Replies)
Discussion started by: Vit0_Corleone
8 Replies

4. News, Links, Events and Announcements

Flaw leaves Linux computers vulnerable

NEWS: Flaw leaves Linux computers vulnerable http://news.com.com/2100-1001-857265.html A flaw in a software-compression library used in all versions of Linux could leave the lion's share of systems based on the open-source operating system open to attack, said sources in the security... (3 Replies)
Discussion started by: killerserv
3 Replies
Login or Register to Ask a Question
TAC(1)                                                             User Commands                                                            TAC(1)

NAME
tac - concatenate and print files in reverse SYNOPSIS
tac [OPTION]... [FILE]... DESCRIPTION
Write each FILE to standard output, last line first. With no FILE, or when FILE is -, read standard input. Mandatory arguments to long options are mandatory for short options too. -b, --before attach the separator before instead of after -r, --regex interpret the separator as a regular expression -s, --separator=STRING use STRING as the separator instead of newline --help display this help and exit --version output version information and exit AUTHOR
Written by Jay Lepreau and David MacKenzie. REPORTING BUGS
GNU coreutils online help: <http://www.gnu.org/software/coreutils/> Report tac translation bugs to <http://translationproject.org/team/> COPYRIGHT
Copyright (C) 2017 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. SEE ALSO
rev(1) Full documentation at: <http://www.gnu.org/software/coreutils/tac> or available locally via: info '(coreutils) tac invocation' GNU coreutils 8.28 January 2018 TAC(1)