Posted on 08/10/2017 7:14:54 PM PDT by BenLurkin
The multidisciplinary team at the University of Washington isnt out to make outlandish headlines, although its certainly done that. They were concerned that the security infrastructure around DNA transcription and analysis was inadequate, having found elementary vulnerabilities in open-source software used in labs around the world. Given the nature of the data usually being handled, this could be a serious problem going forward.
Sure, they could demonstrate the weakness of the systems with the usual malware and remote access tools. Thats how any competent attacker would come at such a system. But the discriminating security professional prefers to stay ahead of the game.
One of the big things we try to do in the computer security community is to avoid a situation where we say, Oh shoot, adversaries are here and knocking on our door and were not prepared,' said professor Tadayoshi Kohno, who has a history of pursuing unusual attack vectors for embedded and niche electronics like pacemakers.
(Excerpt) Read more at techcrunch.com ...
Bkmrk for later. Thank you for the portion you posted.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.