Privacy News Researchers continue hacking cars, and start on heavy vehicles

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
69,342
7,679
Western Australia
When Charlie Miller and Chris Valasek demonstrated a year ago how they can remotely exploit vulnerabilities in Chrysler’s 2014 Jeep Cherokee, and fiddle with its wipers, radio, motor and brakes (at low speeds), it forced the company to confront and address the issues.
trucks.jpg

But their research into automotive security didn’t end there, and the pair is scheduled to present new techniques for injecting CAN messages onto the vehicle’s network at Black Hat USA 2016 on Thursday.

Again they targeted the same Jeep Cherokee, and this time the potential consequences of a successful attack are even more scary, as they have managed to bypass protections and can “tell” the car to brake or turn the steering wheel at any speed.

As Chrysler has fixed the flaw that previously allowed them remote access to the car’s systems, these latest attacks can be performed only when the attacker’s laptop is connected to the car’s CAN network via a onboard diagnostic (OBD) port located under its dashboard.

But the researchers say it’s only a matter of time until another flaw is found that will allow remote access and attacks, and that’s why the automotive industry has to test, attack and audit their products for flaw constantly

Full Article. Researchers continue hacking cars, and start on heavy vehicles - Help Net Security
 
Great share @frogboy ..:)...
All this Car-Hacking is a frightening prospect for the future...:eek:
I was not in favour of the "diagnostic ports" being introduced to cars in the first place...
Nor was I in favour of electric windows/locking,as I consider them less safe..
It seems that "progress" is less influenced by "logic" than it is "planned obsolescence",and "rich peoples wishlists"
 

You may also like...