Once only reserved for military use, commercial drones have become increasingly popular to consumers. They have become so popular that the UK government has regulated where you can and can't fly them, in part due to the recent cases of drone activity at Gatwick and Heathrow Airport that disrupted thousands of passengers' inbound and outbound flights.
What is a drone?
A drone is an aeronautical term referring to an unmanned aircraft (UAV). Francis Brown, partner at a Cyber Security firm, described them as a flying computer that can be remotely controlled. Drones can be used to attack wireless connections like Wi-Fi and Bluetooth, making it easier for hackers to breach privacy by way of intercepting a connected device in your home to collect sensitive data. To put this into perspective, drones can be used to target Bluetooth-connected devices, such as keyboards, to record keystrokes, and potentially obtain usernames and passwords.
Researchers have developed ways to keep their perimeter protected. For example, DroneDefender by Battelle utilises its own high-powered radio signal waves to jam the frequency and knock drones out of the sky. Drones have become a risk that even government agencies and companies worldwide are issuing drone-hacking Cyber Security boot camps designed to respond to the 'Cyber Security skills gap'.
In response to this, through our expert Cyber partner Siker, Tony Reeves is delivering the following course:
There are many known and unknown vulnerabilities in devices that are connected to the internet, particularly when these connections are left open or not protected. As drones become more widespread, ensure your devices, such as a Bluetooth keyboard or printer, are protected with the correct security to prevent cybercriminals gaining access to your home or business network. As with every new technology, hackers and criminals are always finding a way to exploit them. The best thing to do is stay protected and be vigilant with devices when connected to the internet.
Visit cyber.qa.com for more information on how they can help solve the Cyber Security skills gap.
James Aguilan currently works as a Cybersecurity Researcher. He has provided upskilling and development to Government Agencies, National Critical Infrastructures and Large Corporations through the simulation of cyber-attacks and forensic investigations workshops. In the past, James worked as a Data Consultant where he advised high profiling clients on how to handle their data in a Civil Litigation or Criminal Investigation. Notably, this includes the largest Merger between two US Powerhouse Conglomerate, a deal worth $87 billion. Additionally, he has also served as a Cybersecurity Consultant where he would Respond to Incidents and Perform Full Forensic Investigations. James holds a first-class honour in Computer Forensics and is actively working towards a Masters in Network Security and Penetration Testing.
More articles by James
Cyber Pulse: Edition 105
Cyber Pulse: Edition 104
Cyber Pulse: Edition 103
Cyber Pulse: Edition 102
Cyber Pulse: Edition 101
4 things you need to know about cyber security in 2020
How does Ransomware-as-a-Service work?
Phishing Campaigns: Defending organisations against phishing
Is Mr Robot a good representation of real-life hacking and hacking culture?
Safeguarding your Digital Footprint