Now that's not comforting.  At all.


On Fri, Oct 7, 2011 at 1:01 PM, Ben Scott <[email protected]> wrote:

>  The computers used by the US Air Force to fly some of the Predator
> and Reaper drones -- which are platforms capable of carrying weapons
> -- have apparently been compromised for by keystroke-logging malware.
> The best part?  They detected it a few weeks ago and they're still
> flying them.
>
> http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/
>
>  As we know, the first rule of computer security is that once someone
> else's software runs on your computer, it's not your computer anymore.
>
>  Forget Skynet.  Humanity will die because some teenage punk hacks a
> weapons controller and pushes the wrong button.  I wonder if the admin
> password on these computers is "Joshua"?
>
> -- Ben
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
>


-- 
David

_____________________

My short term goal is to make it through the day.
My long term goal is to string a bunch of short term goals together.
*
*

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to