Hacking Cars Getting Easier and More Dangerous
Legacy signals
Legacy popularity: 874 legacy views
If your car is in any way connected to the Internet, it can get hacked into. You know it's only a matter of time before hackers begin infiltrating motor vehicles in droves, being that vehicles are plagued with hundreds to thousands of security vulnerabilities.

This hack is more serious than you think. Drivers and passengers should be aware that "flawed" and compromised vehicles can suddenly be overtaken remotely, forced into shutting down the engine in the middle of a highway or drive the car into other cars. And it's not just cars, but 18-wheelers and busloads of people.
In fact, white-hat hackers (the good guys) have even demonstrated that a bad hacker could take control of a motor vehicle, ranging from annoying pranks such as turning on the windshield wipers and radio, to potentially lethal actions like stopping the engine.
Hackers could demand ransom from governments in bitcoins for the return of the vehicles' control to their drivers. Or, as the Assistant Atto ey General for National Safety has indicated, "connected cars are the new battlefield". Connected cars could be used by terrorist organizations to create havoc on mass scale. The possibilities are limited by the imagination.
This conce has motivated the FBI, Department of Transportation and the National Traffic Safety Administration to issue a public safety alert, warning consumers to keep their service schedule in order to enable to upgrade cars' software with remedies to those security vulnerabilities.
Solutions are available and in the works.
- If your car has any web connecting abilities, do your research for year/make/model. Searched "hacked" along with the cars particulars.
- Manufacturers that have discovered security vulnerabilities (often because a researcher makes it public) have offered subsequent patches in response. These notices may come in the mail or through a dealership.
- It's important to check with your cars manufactures website to determine if a vulnerability exists.
- A connected vehicle has ECUs: electronic control units. An article in Fortune says Karamba Security's "Carwall" can detect and thwart cyber attacks. Carwall is like a firewall for your vehicle ECU. It detects anything that's not permitted to load or run on ECUs.
When the ECU software is being built, security software can be seamlessly embedded, becoming part of the entire process. No change of code, no developers' know-how, no false positives and no hacks. Problem solved.
Article author
About the Author
Robert Siciliano personal security specialist
Further reading
Further Reading
Article
The Seven Steps to Forgiveness
An Excerpt from The Feeling Soul - A Roadmap to Healing and Living By Mark Linden O’Meara Available at Amazon.com Seven Steps to Forgiveness Much has been written about forgiveness. Everywhere you turn people are saying you have to forgive, yet few people likely understand the process of ...
Related piece
Article
Book Review: Stand Up for Your Life: A Practical Step-by-Step Plan to Build Inner Confidence and Personal Power
Amazon.com Review: \ Oprah life makeover maven Cheryl Richardson wants you to start rocking the boat. Stand Up for Your Life urges readers to stop playing it safe by putting their needs and priorities aside. Her premise: by spending less time listening to others and more time strengthening your ... Amazon.com Revi
Related piece
Website
Cheryl Richardson's Official Site
Access practical tools, challenging ideas, resources, and helpful information that will support you in living a life that honors your soul.
Related piece
Article
Learning the Language of Feelings
Learning the Language of Feelings An excerpt from The Feeling Soul – A Roadmap to Healing and Living Mark Linden O’Meara, Soul Care Publishing ISBN: 0-968045928 Available at Amazon.com Part of self growth and developing self-knowledge involves learning to express the feelings, ideas and ...
Related piece