small plane flying

Department of Homeland Security Issues Cybersecurity Warning for Small Planes

Planes using networked communication systems are particularly vulnerable to cyberattacks, according to a flaw discovered by researchers.

The Department of Homeland Security issued a security alert for operators of small planes on Tuesday, advising plane owners that their flight systems are vulnerable to hacking if someone gains unauthorized physical access to their planes.

Plane owners should ensure that they are restricting physical access until the industry develops safeguards to address the problem, the DHS critical infrastructure computer emergency response team said. According to the Associated Press, the issue was originally discovered by Rapid7, a cybersecurity firm based in Boston that reported the bugs to the federal government.

The firm found that an attacker could disrupt and manipulate electronic messages across a small plane’s network by attaching a small device to its wiring. Those messages could include crucial information like engine readings, compass data and altitude.

Aircraft systems, like their automotive counterparts, are becoming more reliant on networked communication systems, the AP reported. Auto companies have already had to address several vulnerabilities exposed in their own systems.

Rapid7’s research focused on small planes because data was easier to acquire and large aircraft typically have more complex systems that must meet additional security regulations, according to the AP. Older small planes with mechanical control systems are also not included in the alert issued by the government.

Lamar Bailey, the senior director of security research at security firm Tripwire, said that organizations often worry about external attacks without realizing the lingering dangers of physical access.

“The ability to directly connect to a system allows the attacker to bypass many of the layers of security in place for remote defense,” Bailey said. “Insider threat is still one of the most dangerous and hardest to defend against.”

The Federal Aviation Administration, which oversees air traffic control operations across the U.S., has also been facing its own set of challenges when it comes to security.

In a Department of Transportation inspector general’s report earlier this year, the FAA was reprimanded for not having a “comprehensive, strategy policy framework to identify and mitigate cybersecurity risks.” The agency responded by vowing to have a plan in place by the end of September, the AP reported.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.