A New Generation of Cyberattacks that Can Fry Your Computer

If we thought that cyberattacks can only affect our computers to the software level, then here’s a something to give this thought a different perspective!

cyber_attack_burn_computers

Uptil now, we witnessed cyberattacks going after the software components of targeted computers. But apparently, there is something scarier than this; something that can take down the hardware – the very physical components of targeted devices.

At a recent RSA conference, a new generation of cyberattack was brought under the spotlight. This attack can be deployed to burn down the internal components of a targeted machine, permanently damaging the data and disabling the machine itself. What was demonstrated at the conference was how a fake firmware update can be used to raise the machine’s temperature and disable the fans. The machine used in the demonstration was an Apple OS X.

If we talk about the present generation of malware such as CryptoLocker, data or systems affected by it can still be recovered or retrieved. But in cyberattacks that are capable of torching the entire hardware, the odds of any recovery are bleak.

As harmful as these kinds of cyberattacks are for individuals, they can be catastrophic for small and large enterprises.

Rajiv Singha

Rajiv Singha

Follow @Singha_Ra

Subscribe
Notify of
guest
5 Comments
Inline Feedbacks
View all comments
mohit
mohit
6 years ago

Dear,
how one can identify such device or hardware which is built for cyberattack. is there any kind of testing. who is making such hardware and why?

ANJUMAN BARIOMKABOMASAKI
ANJUMAN BARIOMKABOMASAKI
6 years ago
Reply to  Rajib Singha

Frightening!! Dear, How to Hack A facebook account?

samuel
samuel
5 years ago

date of birth as a default password in most government organisation, how much is it secure,……
(help me its my seminar research)

Rahul Thadani
5 years ago
Reply to  samuel

Hi Samuel,

It is highly recommended to not put date of birth as a password. Nowadays, this information can be easily acquired from multiple sources through social engineering methods. So alternative passwords should be recommended and used, especially in government organizations.

Regards.

5
0
Would love your thoughts, please comment.x
()
x