Connect with us

Hi, what are you looking for?

DOGE0.070.84%SOL19.370.72%BNB287.900.44%USDC1.000.01%AVAX15.990.06%XLM0.080.37%
USDT1.000%XRP0.392.6%BCH121.000.75%DOT5.710.16%ADA0.320.37%LTC85.290.38%
THE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & LifestyleTHE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & Lifestyle

Technology

Technology

Malicious code can now jump from DNA to computers

We now live in a time in which you can use DNA to hack computer systems.

The discovery was made by a group of researchers at the University of Washington made up of both computer science and molecular biology specialists. They focus on how information is encoded not only in computer systems, but also in biological systems, and particularly in the overlap between the two.

The team of researchers originally launched the project because they noticed possible security vulnerabilities in the computer systems used at their university for DNA sequencing and analysis. The lab treated DNA samples were treated as non-threatening input, but the researchers could imagine a way to sneak code into the computer system via DNA. So they decided to hack the DNA sequencing computer system to prove it.

In this particular case, the group of researchers encoded a malicious program onto a synthetic strand of DNA only 176 bases long — a very small amount. Then a computer read and transcribed the DNA into binary code, which could then be read and executed by a computer. The researchers had already purposefully inserted certain vulnerabilities into the computer’s security system so that the computer wasn’t protected against the malicious code. In this case, the malicious code gave the researchers remote control over the infected computer.

The researchers could have simply chosen to infect the system using malware or remote access tools. Instead, they wanted to infiltrate the system using a virus to prove that it is a real vulnerability which warrants consideration.

The group stresses that they don’t believe there is any cause for alarm, as there is little immediate danger. However, they urge us to begin thinking about such possible threats now, before they become immediate threats.

Security concerns aside, the discovery is interesting in scientific terms. This experiment shows us how fully biological and computer code can overlap, and it invites us to imagine a world of fluid boundaries between life and computer.

You can read the whole paper here.

Featured Image via Pixabay


Comment Template

You May Also Like

Finances

One gathering is changing cash destiny in a quickly computerized society. Fire blocks, the inventive tech organization disturbing robotized finance Because of its creative...

Security

Cybersecurity Concerns: Chinese Tech Company Allegedly Asserts Leaked documents have surfaced, suggesting that a Chinese cybersecurity firm, i-Soon, asserted its capability to hack the...

Security

Cybersecurity The Factors Behind Varied Impact of Cyber-Attacks The British Library, once a haven for writers, is grappling with the aftermath of a ransomware...

Business

How to Conduct Market Research on a Tiny Budget   Breaking Barriers: Affordable Strategies for In-Depth Market Research That Packs a Punch Key Takeaways:...

Notice: The Biznob uses cookies to provide necessary website functionality, improve your experience and analyze our traffic. By using our website, you agree to our Privacy Policy and our Cookie Policy.

Ok