Concerns Grow Over Auto Industry's Cyber-Security Blind Spots
Cyber threats have emerged as a big concern for automakers, as researchers have exposed serious holes in vehicle security that could allow hackers to commandeer cars. Those worries might be small compared to what's ahead.
60 Minutes has a segment showing how the Software Innovation Division of the Defense Advanced Research Projects Agency hacks into a Chevrolet Impala through the Onstar telematics system and gains control of the vehicle while reporter Leslie Stahl is driving.
It used to be that all it took to steal a car was a slim jim and a deft hand. But as the recent hacks of models like the Toyota Prius and Tesla Model S shows, these days it takes some real technical know-how. Automakers appear to actually be taking this threat seriously, which means they'll be keenly interested in the news that hacker Silvio Cesare in Australia has his own high-tech approach to breaking into a vehicle that is even possible remotely.
The $10,000 prize for successfully hacking a Tesla Model S has been claimed. A team from Zhejiang University in China claimed victory at the Symposium on Security for Asia Network (SyScan360) event in Beijing by exploiting a "flow design flaw," whatever that means, to gain access to vital systems including the door locks, horn and window controls, while the vehicle was moving.
They're the first researchers to publish coding and details of automotive cyber experiment
Automotive hackers commandeered control of a Ford Escape and Toyota Prius during a recent experiment, and using data culled from the experiment came up with some tips on how automakers can block hackers from gaining access to cars.
In the overall scheme of things, having your Twitter account hacked isn't as bad as a flood or a fire. So, perhaps the "The Fastest Way To Lose BodyFat in (2)Weeks" tweet that Fisker Automotive sent out today isn't going to cause anyone to lose sleep, especially since it was almost instantly fixed. Not long after the body fat tweet went out, someone at Fisker took charge and wrote: "We know that the fans and followers of Fiskerauto don't need to lose weight... Disregard our last tweet as we were
Most of us don't quite understand why we'd want Facebook in our cars, but during a recent Hackathon at Facebook's Palo Alto campus, the Blue Oval and the new Big Blue combined forces to go beyond status updates and photos sharing.
A group of computer scientists managed to wirelessly hack into an unnamed sedan, insert a bit of malicious code and control the vehicle's ECU, giving them access to a variety of in-car control systems. This recent study is further proof that our constantly connected cars are becoming vulnerable to attacks, but sometimes the facts aren't as clear as they'd seem.
The Internet has indeed revolutionized the way people do business, but this doesn't come without some faults. Hackers pose a threat to not only individual people's computers, but to the databases of large corporations, and a recent attack on American Honda now means that 2.2 million owners have had their personal information stolen.
There are a lot of reasons for invention that goes beyond necessity, and pure want is right up there at the top. A clever gent named Dave tired of making the 15-minute walk to his freezing cold car, so he built a long-distance remote starter from a prepaid cellphone.
Kids today. Give them a new toy and before the sun goes down it's been taken apart, hacked, and maybe even improved. Jeff isn't exactly a kid and he picked up this toy some time last January but a Xebra isn't exactly an Playstation so it took a little time. The point is he wasn't totally satisfied with his ride and took it upon himself to bust out the power tools and make some changes. He also made an entertaining and somewhat instructional video of his Xebra hacking adventure which is definitel
We've reported in the past about hacking one's Prius in the search for higher mileage, but what about what about diving into the hybrid's matrix of bits and bytes in search of a more enlightening computing experience? (In the interest of full disclosure, I'm blogging this on a Powerbook G4, have an iMac G5 in the other room and am at the mercy of no less than three iPods.)