Hardware Trojans

July 21, 2016 | Views: 4615

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hey friends,

Everyone’s familiar with software Trojans, but have you ever heard of hardware Trojans? This article is gonna give you some basic ideas. You can also research the topic further using some keywords I’ll provide.

Let’s start with a fun fact: the term TROJAN HORSE comes from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy stealthfully. Everyone knows about the city of Troy, right?

A hardware Trojan is basically defined as a malicious modification of the circuitry on an integrated circuit. For an instance, let’s assume that a brand is offering 5 years warranty on one of its appliances. Right after completion of those 5 years, the appliance stops working due to some technical failure, This could be a type of hardware Trojan that was triggered after 5 years. As such, the company may not cover the failure inside the warranty.

The example above was a type of hardware Trojan. Backdoors may even be seen as hardware Trojans. They may steal your data from your phone and transfer it without you even knowing. Anything and everything from your laptop, mobile, microwave, washing machine can be compromised. And, with Internet of Things(IoT) on its way, it’s becoming more of a concern.

A computer chip was compromised in a commercial jet (Boeing 787) because there was a malicious hardware modification in the chip. And, according to a recent report, hackers can transmit your data from your computer through your CPU fan speed. They control the speed and compromise a system.

During international weapons trades between two countries, the country manufacturing and selling the weapon may create a hardware Trojan in the weapon and trigger at at the time of war. I use the word “trigger” because, as an cyber enthusiast, you may know that no Trojan, software or hardware, works or functions before its triggered. Trigger simply means an indication or a sign for a Trojan to start functioning.

SO, now, let’s end this. YOU ARE SECURE ONLY UNTIL SOMEONE BECOMES INTERESTED IN YOU. Because, I believe, there is a key to every lock.


Thank you for spending your 10 minutes on this article. KEEP HACKING AND LEARNING. It’s the best thing the worlds has given birth to.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
17 Comments
  1. Great job posting this :).It’s a good thing that Cybrary exists because of us who search for appropriate knowledge and like to share some of their own knowledge as well.Keep going 😀

  2. Great post 🙂

  3. Thanks for this post

  4. I really Appreciated the post

  5. thanks for your post

Page 3 of 3«123
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel