Now that's not comforting. At all.
On Fri, Oct 7, 2011 at 1:01 PM, Ben Scott <[email protected]> wrote: > The computers used by the US Air Force to fly some of the Predator > and Reaper drones -- which are platforms capable of carrying weapons > -- have apparently been compromised for by keystroke-logging malware. > The best part? They detected it a few weeks ago and they're still > flying them. > > http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/ > > As we know, the first rule of computer security is that once someone > else's software runs on your computer, it's not your computer anymore. > > Forget Skynet. Humanity will die because some teenage punk hacks a > weapons controller and pushes the wrong button. I wonder if the admin > password on these computers is "Joshua"? > > -- Ben > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > -- David _____________________ My short term goal is to make it through the day. My long term goal is to string a bunch of short term goals together. * * ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
