Feeds

Hackers can make your PC explode

It was only a matter of time, really....

  • alert
  • submit to reddit

High performance access to file storage

Hackers can now turn your home computer into a bomb and blow your family to smithereens, and do so remotely from thousands of miles away, the Weekly World News reports.

The recent DDoS attacks which paralysed the Amazon, Buy.com and eBAY Web sites are tame compared to what will happen in the near future, the paper warns.

Computer expert Arnold Yabenson, president of the Washington-based consumer group National CyberCrime Prevention Foundation (NCPF), says that we've only seen the tip of the iceberg.

"It is already possible for an assassin to send someone an e-mail with an innocent-looking attachment. When the receiver downloads the attachment, the electrical current and molecular structure of the central processing unit is altered, causing it to blast apart like a large hand grenade," the paper quotes Yabenson as saying.

"The criminals who knocked out those on-line businesses are the least of our worries," Yabenson said.

"There are brilliant but unscrupulous hackers out there who have developed technologies that the average person can't even dream of. Even people who are familiar with how computers work have trouble getting their minds around the terrible things that can be done."

"As shocking as this is, it shouldn't surprise anyone. It's just the next step in an ever-escalating progression of horrors conceived and instituted by hackers," he warned.

Yabenson points out that these "dangerous sociopaths" have already vandalised FBI and US Army Web sites, and have come within two digits of cracking an 87-digit Russian security code that would have sent deadly missiles hurtling toward five of America's major cities, the paper notes.

"As dangerous as this technology is right now, it's going to get much scarier," Yabenson said. "Soon it will be sold to terrorists cults and fanatical religious-fringe groups. Instead of blowing up a single plane, these groups will be able to patch into the central computer of a large airline and blow up hundreds of planes at once."

The Register had hoped to interview Yabenson for clarification of just how the planes would be made to explode. Perhaps via embedded microprocessors whose molecular structure could be altered remotely, as with the previously described e-mail attachment, we were thinking.

But alas, a Web search for the NCPF yielded only the North Carolina Psychological Foundation, which, as we consider it, might have a few valuable insights into this story after all... ®

Register historic factoid: Reader Dale Hubbard claims that back in 1980 you could make a Sharp MZ80K smoke, "and sometimes even flame. This was accomplished by writing a program in assembler that would activate/deactivate the cassette relay switch in a very swift toggle motion. The resultant friction could certainly warm up the relay." Thank you, Dale. A well misspent youth.

High performance access to file storage

More from The Register

next story
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.