Feeds

Hackers can make your PC explode

It was only a matter of time, really....

  • alert
  • submit to reddit

Gartner critical capabilities for enterprise endpoint backup

Hackers can now turn your home computer into a bomb and blow your family to smithereens, and do so remotely from thousands of miles away, the Weekly World News reports.

The recent DDoS attacks which paralysed the Amazon, Buy.com and eBAY Web sites are tame compared to what will happen in the near future, the paper warns.

Computer expert Arnold Yabenson, president of the Washington-based consumer group National CyberCrime Prevention Foundation (NCPF), says that we've only seen the tip of the iceberg.

"It is already possible for an assassin to send someone an e-mail with an innocent-looking attachment. When the receiver downloads the attachment, the electrical current and molecular structure of the central processing unit is altered, causing it to blast apart like a large hand grenade," the paper quotes Yabenson as saying.

"The criminals who knocked out those on-line businesses are the least of our worries," Yabenson said.

"There are brilliant but unscrupulous hackers out there who have developed technologies that the average person can't even dream of. Even people who are familiar with how computers work have trouble getting their minds around the terrible things that can be done."

"As shocking as this is, it shouldn't surprise anyone. It's just the next step in an ever-escalating progression of horrors conceived and instituted by hackers," he warned.

Yabenson points out that these "dangerous sociopaths" have already vandalised FBI and US Army Web sites, and have come within two digits of cracking an 87-digit Russian security code that would have sent deadly missiles hurtling toward five of America's major cities, the paper notes.

"As dangerous as this technology is right now, it's going to get much scarier," Yabenson said. "Soon it will be sold to terrorists cults and fanatical religious-fringe groups. Instead of blowing up a single plane, these groups will be able to patch into the central computer of a large airline and blow up hundreds of planes at once."

The Register had hoped to interview Yabenson for clarification of just how the planes would be made to explode. Perhaps via embedded microprocessors whose molecular structure could be altered remotely, as with the previously described e-mail attachment, we were thinking.

But alas, a Web search for the NCPF yielded only the North Carolina Psychological Foundation, which, as we consider it, might have a few valuable insights into this story after all... ®

Register historic factoid: Reader Dale Hubbard claims that back in 1980 you could make a Sharp MZ80K smoke, "and sometimes even flame. This was accomplished by writing a program in assembler that would activate/deactivate the cassette relay switch in a very swift toggle motion. The resultant friction could certainly warm up the relay." Thank you, Dale. A well misspent youth.

5 things you didn’t know about cloud backup

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.