Biological malware was created in the University of Washington in Seattle, where Tadayoshi Kohno and Luis Ceze incorporated real computer exploit into DNA code of molecule. The program that was used to sequence this DNA, read off the code that was expressly generated for it. This code provoked buffer overflow that let the scientists get control over the PC, like hackers do.
Buffer overflow using technology is quite common for hacker attacks on hardware-software complexes. But usually the code that provokes buffer overflow error is contained in malware that is transferred to the device memory via the internet, from external media, etc., and then is executed by the processor. In this case, specially prepared code was read off as the DNA data, interpreted by the sequencing program (to be fair we will shall say that scientists modified it a little bit), and as a result, an error occurred.
Regardless of the fact that attack on the program occurred in “laboratory-like environments”, when the perfectly matched code was introduced into the program specially prepared for this invasion, this experiment proved that development of technologies lead to the possibility of information security threats occurrence in completely unexpected places. And hackers will probably take advantage of such kind of loopholes to get access to sensitive data. After all, what personal data can be more “personal” than human DNA itself?