{"id":295,"date":"2026-05-03T17:38:30","date_gmt":"2026-05-03T17:38:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/?p=295"},"modified":"2026-05-03T17:38:30","modified_gmt":"2026-05-03T17:38:30","slug":"malicious-code-discussion-board","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/2026\/05\/03\/malicious-code-discussion-board\/","title":{"rendered":"Malicious Code Discussion Board"},"content":{"rendered":"\n<p>The Question: The article &#8220;Malicious code written into DNA infects the computer that reads it&#8221; describes a &#8220;world first&#8221; where researchers successfully infected a computer using a malicious program encoded into a physical strand of DNA. While the researchers acknowledge that this specific attack vector is currently difficult to execute, they emphasize that it serves as a symbolic milestone for the overlap between the digital and biological worlds.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>My Response to the Question:<\/p>\n\n\n\n<p>The article about malicious code being written into the DNA explains how technology and biology are starting to overlap and see similarities. In the study the researchers found that some DNA analysis software has vulnerabilities that are similar to normal computer programs. Whenever DNA is sequenced the machine that does it converts the biological info into digital info that a software will then read. The researchers showed flaws in the software by if someone created a specific designed piece of DNA it would be able to take advantage of weaknesses that are in the software.<\/p>\n\n\n\n<p>Isolation methods like VMs helped prevent these kind of problems they were tools that helped separate the DNA analysis software from the main computer system, that way if something malicious was to get through and run it would be contained within the VM and not on the main system and affect the whole computer or even the network it is on.<\/p>\n\n\n\n<p>Along with everything else there are also ethical and security concerns when treating biological data as an untrusted input. Everyone including myself until thought DNA was safe and couldn&#8217;t be harmed but I was wrong because with this research it shows that any type of data including DNA if not properly checked it can be harmed and harmful, especially now that DNA is starting to become more digital so I believe organizations really need to implement a very good cybersecurity practices in order to keep sensitive information safe and protected&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Question: The article &#8220;Malicious code written into DNA infects the computer that reads it&#8221; describes a &#8220;world first&#8221; where researchers successfully infected a computer using a malicious program encoded into a physical strand of DNA. While the researchers acknowledge that this specific attack vector is currently difficult to execute, they emphasize that it serves&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/2026\/05\/03\/malicious-code-discussion-board\/\">Read More<\/a><\/div>\n","protected":false},"author":32019,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/users\/32019"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/codypuffinburger1\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}