» » BAE Releases New Cybersecurity System for F-16 Fighter Aircraft

BAE Releases New Cybersecurity System for F-16 Fighter Aircraft

BAE Releases New Cybersecurity System for F-16 Fighter Aircraft

Dwelling › ICS/OT

BAE Releases New Cybersecurity System for F-16 Fighter Plane

By Eduard Kovacs on October 14, 2022

Tweet

Protection large BAE Methods has unveiled Viper Reminiscence Loader Verifier II (MLV II), a system whose function is to guard F-16 fighter plane in opposition to potential cyberattacks.

MLV II is the second model of a upkeep functionality that ought to “cut back vulnerability to cyberattacks for F-16 plane”.

The system is used to load and confirm software program onto the fighter jet, making certain that malicious software program or recordsdata can not get on the plane.

The system helps mission knowledge recordsdata, flight and fault knowledge, and third-party software program. It helps over 100 F-16 onboard programs, together with flight- and mission-critical elements comparable to radar, engine management, navigation, communications, crash knowledge recorders, and digital warfare, mission and flight management.

“This new model of the product will embody cyber-hardened plane mission capabilities, with an open system structure that reduces lifecycle prices,” mentioned Carl Huncharek, F-16 product line director for BAE Methods.

The corporate says MLV II, which is made in Fort Price, Texas, is absolutely suitable with the F-16 fleet and it will likely be used on all new deployments, whereas current tools may also proceed to be supported.

BAE says the cybersecurity system has been examined by the US and greater than two dozen of its allies.

Associated: CISO Conversations: Honda Plane, Bombardier CISOs Focus on Getting Began in Safety

Associated: US Air Power Adopts Zero Belief to Safe Flightline Operations

Associated: Passengers Uncovered to Hacking by way of Vulnerabilities in Airplane Wi-Fi Gadgets

Associated: Watchdog Urges Extra Motion to Defend Planes From Hackers

Get the Every day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Flaw in Microsoft OME May Result in Leakage of Encrypted Information
  • Timing Assaults Can Be Used to Test for Existence of Non-public NPM Packages
  • IronVest Emerges From Stealth Mode With $23 Million in Seed Funding
  • New ‘Alchimist’ Assault Framework Targets Home windows, Linux, macOS
  • Seven ‘Creepy’ Backdoors Utilized by Lebanese Cyberspy Group in Israel Assaults
  • BAE Releases New Cybersecurity System for F-16 Fighter Plane
  • PoC Revealed for Fortinet Vulnerability as Mass Exploitation Makes an attempt Start
  • Austria’s Kurz Units up Cyber Agency With Ex-NSO Chief
  • DataGrail Raises $45 Million for Information Privateness Platform
  • Mirai Botnet Launched 2.5 Tbps DDoS Assault Towards Minecraft Server

On the lookout for Malware in All of the Mistaken Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

How you can Establish Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

How you can Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles