The Latest in IT Security

3-D Printing Vulnerabilities: Build Your Own Breach?

11
Jul
2016
3-D Printing Vulnerabilities: Build Your Own Breach?

hydra-left

Once reserved for large-scale manufacturing plants and educational institutions, 3-D printers are now going mainstream, with IDC predicting double-digit growth in shipments each year through 2020. But according to research from Carnegie Mellon University, increased availability may also prompt a rise in 3-D printing vulnerabilities — is “build your own breach” the next big attack vector?

While the consumer 3-D printing market lacks focus — relatively cheaper devices make it possible to print novelty items but don’t yet offer day-to-day benefits — business-driven solutions are enjoying widespread success. As noted by Hackaday, for example, companies have started experimenting with Hydra printers, which use multiple heads to create several objects simultaneously.

Read More

Leave a reply


Categories

FRIDAY, MARCH 22, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks