Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Connect with us

Hi, what are you looking for?

slide 3 of 2
THE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & LifestyleTHE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & Lifestyle

Technology

Technology

Malicious code can now jump from DNA to computers

We now live in a time in which you can use DNA to hack computer systems.

The discovery was made by a group of researchers at the University of Washington made up of both computer science and molecular biology specialists. They focus on how information is encoded not only in computer systems, but also in biological systems, and particularly in the overlap between the two.

The team of researchers originally launched the project because they noticed possible security vulnerabilities in the computer systems used at their university for DNA sequencing and analysis. The lab treated DNA samples were treated as non-threatening input, but the researchers could imagine a way to sneak code into the computer system via DNA. So they decided to hack the DNA sequencing computer system to prove it.

In this particular case, the group of researchers encoded a malicious program onto a synthetic strand of DNA only 176 bases long — a very small amount. Then a computer read and transcribed the DNA into binary code, which could then be read and executed by a computer. The researchers had already purposefully inserted certain vulnerabilities into the computer’s security system so that the computer wasn’t protected against the malicious code. In this case, the malicious code gave the researchers remote control over the infected computer.

The researchers could have simply chosen to infect the system using malware or remote access tools. Instead, they wanted to infiltrate the system using a virus to prove that it is a real vulnerability which warrants consideration.

The group stresses that they don’t believe there is any cause for alarm, as there is little immediate danger. However, they urge us to begin thinking about such possible threats now, before they become immediate threats.

Security concerns aside, the discovery is interesting in scientific terms. This experiment shows us how fully biological and computer code can overlap, and it invites us to imagine a world of fluid boundaries between life and computer.

You can read the whole paper here.

Featured Image via Pixabay


Comment Template

You May Also Like

Security

Hackers Strike Back: Everest Ransomware Gang’s Leak Site Defaced A recent cyber twist has unfolded as the leak site used by the notorious Everest...

Finances

One gathering is changing cash destiny in a quickly computerized society. Fire blocks, the inventive tech organization disturbing robotized finance Because of its creative...

Security

Cybersecurity Concerns: Chinese Tech Company Allegedly Asserts Leaked documents have surfaced, suggesting that a Chinese cybersecurity firm, i-Soon, asserted its capability to hack the...

Security

Cybersecurity The Factors Behind Varied Impact of Cyber-Attacks The British Library, once a haven for writers, is grappling with the aftermath of a ransomware...

Notice: The Biznob uses cookies to provide necessary website functionality, improve your experience and analyze our traffic. By using our website, you agree to our Privacy Policy and our Cookie Policy.

Ok