Skip to main content

Are TrackingPoint Rifles Vulnerable to Hackers? [VIDEO]

Are TrackingPoint Rifles Vulnerable To Hackers

Are TrackingPoint rifles vulnerable to hackers? Watch these cyber security experts work their magic and show what a malicious hacker could do to one.

TrackingPoint rifles are very technologically advanced and make long range shooting significantly easier for their users. While the ethics of using them for hunting are debatable, they are undoubtedly great tools for police and military snipers.

However, as with any advanced technology, there is the distinct possibility that it could be taken over and misused by a hacker. Check out the video below and watch the cyber security experts determine if TrackingPoint rifles are vulnerable to hackers.

Especially considering the implications of having a military weapon being taken over by a hacker, I hope that the people at TrackingPoint take this opportunity and address the security holes in the rifle that were demonstrated in this video. Here is what they say on the homepage of their website.

Valued TrackingPoint Community,

Wired Magazine recently reported that information security consultants discovered software vulnerabilities in TrackingPoint guns. We are working with the consultants to verify their assessment and will provide you with a software update if necessary. Until then, please note the following: Since your gun does not have the ability to connect to the internet, the gun can only be compromised if the hacker is actually physically with you. You can continue to use WiFi (to download photos or connect to ShotView) if you are confident no hackers are within 100 feet.

We will keep you updated, and hope you continue to have exhilarating TrackingPoint shooting experiences!

NEXT: 12 Ridiculously Expensive Guns You’ll Never Be Able To Afford

Like what you see here? You can read more great hunting articles by John McAdams at The Big Game Hunting Blog. Follow him on Twitter @TheBigGameHunt.

you might also like

Are TrackingPoint Rifles Vulnerable to Hackers? [VIDEO]