This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
When securing a jobsite against malicious hackers, most go to protect computer files, and few look up and worry about the tower cranes. But many cranes—whether tower, mobile or industrial—can be remotely run via radio wireless controllers, a useful feature for when operators need a clearer view of the load from the ground. Unfortunately, these wireless signals are vulnerable to hijacking, according to a study released earlier this year by security research firm Trend Micro. It found that the radio signals these crane controllers use are not encrypted over the air in any way, and can be easily intercepted and spoofed using off-the-shelf equipment and a basic knowledge of electronics and radio engineering.
“In other operational and industrial technology, there are some security measures,” says Greg Young, vice president of cybersecurity at Trend Micro. “In this case, we didn’t have to find vulnerabilities. There was no need to pick the lock on the door, the door was open—no encryption, no proprietary protocols.”