Once only reserved for military use, commercial drones have become increasingly popular to consumers. They have become so popular that the UK government has regulated where you can and can't fly them, in part due to the recent cases of drone activity at Gatwick and Heathrow Airport that disrupted thousands of passengers' inbound and outbound flights.
What is a drone?
A drone is an aeronautical term referring to an unmanned aircraft (UAV). Francis Brown, partner at a Cyber Security firm, described them as a flying computer that can be remotely controlled. Drones can be used to attack wireless connections like Wi-Fi and Bluetooth, making it easier for hackers to breach privacy by way of intercepting a connected device in your home to collect sensitive data. To put this into perspective, drones can be used to target Bluetooth-connected devices, such as keyboards, to record keystrokes, and potentially obtain usernames and passwords.
Researchers have developed ways to keep their perimeter protected. For example, DroneDefender by Battelle utilises its own high-powered radio signal waves to jam the frequency and knock drones out of the sky. Drones have become a risk that even government agencies and companies worldwide are issuing drone-hacking Cyber Security boot camps designed to respond to the 'Cyber Security skills gap'.
In response to this, through our expert Cyber partner Siker, Tony Reeves is delivering the following course:
Drones – Disruptive Operations and Countering: Vulnerabilities and Opportunities.
There are many known and unknown vulnerabilities in devices that are connected to the internet, particularly when these connections are left open or not protected. As drones become more widespread, ensure your devices, such as a Bluetooth keyboard or printer, are protected with the correct security to prevent cybercriminals gaining access to your home or business network. As with every new technology, hackers and criminals are always finding a way to exploit them. The best thing to do is stay protected and be vigilant with devices when connected to the internet.
Visit cyber.qa.com for more information on how they can help solve the Cyber Security skills gap.
More articles by James
Cyber Pulse: Edition 105
Read the latest edition of Cyber Pulse, our round-up of cyber news.16 March 2020
Cyber Pulse: Edition 104
Read the latest edition of Cyber Pulse, our round-up of cyber news.09 March 2020
Cyber Pulse: Edition 103
Read the latest edition of Cyber Pulse, our roundup of cyber news.02 March 2020
Cyber Pulse: Edition 102
Read the latest edition of Cyber Pulse, our roundup of cyber news.24 February 2020
Cyber Pulse: Edition 101
Read the latest edition of Cyber Pulse, our roundup of cyber news.17 February 2020
4 things you need to know about cyber security in 2020
Cybersecurity researcher James Aguilan predicts four areas that will shape the future of cybersecurity in the decade ahead.22 January 2020
How does Ransomware-as-a-Service work?
Cyber security Researcher, James Aguilan looks at how ransomware-as-a-service works, and how organisations can protect themse…07 August 2019
Phishing Campaigns: Defending organisations against phishing
QA Cyber Security Trainer, James Aguilan, argues that understanding how to defend against phishing is of paramount importance…15 February 2018
Is Mr Robot a good representation of real-life hacking and hacking culture?
QA Cybersecurity trainer James Aguilan looks at several scenarios featured in the hit US TV series Mr Robot – and how they ma…19 February 2018
Safeguarding your Digital Footprint
QA Cyber Security Trainer, James Aguilan, shares 6 tips that can help you safeguard your digital footprint.05 March 2018