Tuesday, October 27, 22:42
Home security Online DNA services may be at risk of 'genetic hacking'

Online DNA services may be at risk of 'genetic hacking'


Lately, services that allow people to discover their ancestral tree and find the origin of their ancestors, through their DNA, have become very popular. However when one lists his genetic information in one online database, exposes this information to a new threat.

According to a study conducted by the University of California, Davis, these services may be vulnerable to certain variants of genetic hacking. When users upload DNA sequences to databases, hackers they can steal the genomes of many people, or even identify certain individuals, from specific genetic variants, such as those presented by Alzheimer's.

According to Professor Graham Coop, users expose much more than they think when uploading their genetic data. As he comments, the genome is not stolen credit card, that you can just cancel it and order a new one.


It is worth noting that vulnerabilities they do not affect speculative services, in which the user sends a DNA sample and receives a code that allows him to see the results on his pedigree tree. Those at risk are those who simply provide an online database in which one can go in and see if their genetic material fits in with another.

As the research team discovered, there are three types of attacks: IBS Tiling, IBS Probing and IBS Baiting.

IBS Tiling: A hacker could acquire genomes from one database and see what corresponds to other genomes within it. If enough bits are identified, a person's genome could potentially be revealed.

IBS Probing: This approach could be used to find people who carry a particular genetic variant. The study used an Alzheimer's gene as an example. In this approach, a fake DNA genome will be created that is unlikely to match anyone except a small portion of the sequence that matches the gene of interest. Any matches in a public database for this falsified genome will reveal people with this particular gene.

IBS Baiting: This strategy fools a class of algorithms used to locate relatives in certain public databases. A hacker could find almost all the genetic information stored in an entire database.

All three strategies could possibly be implemented by a person with both information technology as much as genetics, as a postgraduate student.

Anyone who uses these services should know the potential risks, and how much of his information could be stolen by hackers.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement



Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...