Boeing 787 grounded over hacking fears

Powered by SC Magazine
 

The Federal Aviation Authority (FAA) has grounded Boeing's new 787 airliner after concerns about the integrity of its computer systems.

The FAA said last week that it was unhappy with the possibility of passengers being able to hack into the aircraft's flight systems using the data links built into each seat.

"The proposed architecture of the 787 allows passenger connectivity to previously isolated data networks connected to systems that perform functions required to the safe operation of the airplane," the FAA report stated.

"This new passenger connectivity may result in security vulnerabilities from intentional corruption of data and systems critical to the safety of the airplane."

Boeing has said that it is working with the FAA to resolve the problem and that it had already built a firewall between the systems. The manufacturer claims that the systems would be 100 per cent secure.

However, Bruce Schneier, chief technology officer at security firm BT Counterpane, said that the likelihood of the system being perfect is "zero" .

"It is possible that Boeing can make the connection to the internet secure. If it does, it will be the first time that anyone has done so," he told Associated Press.

The Air Line Pilots Association has also expressed concern about the systems and has suggested that pilots should have a "kill switch" to shut down passenger data networks.

Copyright ©v3.co.uk


Boeing 787 grounded over hacking fears
 
 
 
Top Stories
Photos: Global Switch opens Sydney East data centre
First stage opened, to some fanfare.
 
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 482

Vote