Untitled Document

Hackers Find Weaknesses in Car Computer Systems

by Nizar on 2013-09-04 at 10:29:21


As cars become more like PCs on wheels, what's to stop a hacker from taking over yours?

In recent demonstrations, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers.

The hackers are publicizing their work to reveal vulnerabilities present in a growing number of car computers. All cars and trucks contain anywhere from 20 to 70 computers. They control everything from the brakes to acceleration to the windows, and are connected to an internal network. A few hackers have recently managed to find their way into these intricate networks.

In one case, a pair of hackers manipulated two cars by plugging a laptop into a port beneath the dashboard where mechanics connect their computers to search for problems. Scarier yet, another group took control of a car's computers through cellular telephone and Bluetooth connections, the compact disc player and even the tire pressure monitoring system.

To be sure, the "hackers" involved were well-intentioned computer security experts, and it took both groups months to break into the computers. And there have been no real-world cases of a hacker remotely taking over a car. But experts say high-tech hijackings will get easier as automakers give them full Internet access and add computer-controlled safety devices that take over driving duties, such as braking or steering, in emergencies. Another possibility: A tech-savvy thief could unlock the doors and drive off with your vehicle.

"The more technology they add to the vehicle, the more opportunities there are for that to be abused for nefarious purposes," says Rich Mogull, CEO of Phoenix-based Securosis, a security research firm. "Anything with a computer chip in it is vulnerable, history keeps showing us."

In the last 25 years, automakers have gradually computerized functions such as steering, braking, accelerating and shifting. Electronic gas pedal position sensors, for instance, are more reliable than the old throttle cables. Electronic parts also reduce weight and help cars use less gasoline.

The networks of little computers inside today's cars are fertile ground for hackers.

Charlie Miller, a St. Louis-based security engineer for Twitter, and fellow hacker Chris Valasek, director of intelligence at a Pittsburgh computer security consulting firm, maneuvered their way into the computer systems of a 2010 Toyota Prius and 2010 Ford Escape through a port used by mechanics.

"We could control steering, braking, acceleration to a certain extent, seat belts, lights, horn, speedometer, gas gauge," said Valasek. The two used a federal grant to expose the vulnerability of car computers. Even with their expertise, it took them nine months to get in.

Valasek and Miller released a report, including instructions on how to break into the cars' networks, at a hacker convention in August. They said they did so to draw attention to the problems and get automakers to fix them. The pair say automakers haven't added security to the ports.

Ford wouldn't comment other than a statement saying it takes security seriously, and that Miller and Valasek needed physical access to the cars to hack in.

 

Toyota said it has added security and continually tests it to stay ahead of hackers. The company said its computers are programmed to recognize rogue commands and reject them.



20
Oct

Finland: Hacker illegally accessed 60,000 servers worldwide and used foreign

by Nadeer

Finland: A hacker has been arrested from Helsinki (capital and largest city of Finland) for a suspect in Illegal accessing of 60,000 servers worldwide.

Along with the servers, hacker


14
Oct

Vulnerability in Whatsapp allows decrypting user messages

by Nadeer

A serious vulnerability in WhatsApp allows anyone who is able to eavesdrop on WhatsApp connection to decrypt users' messages.

 Whatsapp, the mobile application for instant messaging platform has


11
Sep

7 top changes in Apple's new iOS 7 operating system

by Nadeer

Apple is touting its latest mobile operating system as the "most significant" iOS update since the original iPhone.

"Downloading iOS 7 is like getting an all-new device," said Craig Federighi,


09
Sep

Facebook, Google and Twitter caught monitoring URLs in messages -

by Nizar

Large Internet firms including Facebook, Google and Twitter are monitoring some web links sent between their users, including those in private communications, a research firm has confirmed. Swiss security


28
Aug

Web and Mobile Interest Group Emerges from W3C to Further

by Nadeer

Everyone’s on the move these days — the mobile Web movement that is. The World Wide Web Consortium (W3C) is, too, and is adding more depth to its mission for


25
Aug

Affordable web designs that are effective

by Nizar

New article released on the effectiveness of good web design for business.

With increase in the population of IT professionals with every passing year, web development in


20
Aug

HTTPS hack

by Nizar

The HTTPS security measures that are used to protect websites are susceptible to a new attack that can extract information in as little as 30 seconds.

The method, called


19
Aug

50 BIG Social Media Stats of 2013

by Nadeer

The Social Media industry has shown no signs of slowing down, which means it’s becoming and in some cases already is a major channel


18
Aug

Hackers targeting servers running Apache Struts applications

by Nadeer

Hackers targeting servers running Apache Struts applications, researchers say 

A tool for exploiting known Struts vulnerabilities is available on Chinese hacker forums, Trend Micro researchers said

Chinese hackers


13
Aug

Website Abandonment – How to Keep Visitors From Leaving Your

by nizar

Getting traffic is half the battle…keeping that traffic is an entirely different story.

You may have a great product, an award-winning website design, and even stellar content, but if


13
Aug

Facebook for Business to revolutionise business

by Nizar

Facebook has always considered business to be an integral part of its mission to enhance communications and because of Facebook, thousands of businesses have indeed prospered. Whether it is a


13
Aug

Majority of Internet users in Iraq have Facebook account

by Nizar

A new comprehensive survey from the Arab Advisors Group probed the media consumption habits in Iraq. The survey provides insights into the broadcast and online media