Attacks/Breaches
12/27/2013
09:30 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

The Coolest Hacks Of 2013

Take a look back at security researchers' most extreme, creative, and just plain bizarre hacks this year.

Source: Miller and Valasek whitepaper.
Source: Miller and Valasek whitepaper.

Highway To Hell: Cars Get 0wned

There was plenty of nervous laughter at DEF CON this summer when renowned researchers Charlie Miller and Chris Valasek showed how they were able to hack the electronics of the 2010 Toyota Prius and Ford Escape to override the cars' smart steering, braking, acceleration, engine, and other features. The researchers, who had no experience with car electronics prior to their dismantling the dashboards and figuring out the cars' networks, released the tools they built that allowed them to jerk the steering wheel out of the driver's control and to disable the brakes.

Read the rest of this story on Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
1/2/2014 | 4:12:50 PM
Re: Scary not Cool
Agreed -- those hacks highlight the potential for harm in some otherwise cool ideas. Security needs to be more of a priority.
SaneIT
50%
50%
SaneIT,
User Rank: Apprentice
12/30/2013 | 8:39:23 AM
Re: Scary not Cool
I had a conversation with some folks a few years ago about how easy it is to control the computer systems of modern vehicles.  It took a funny turn because they jokingly called me a conspiracy theorist.   Now that we're seeing more proof of concept attacks against vehicles it really is a bit frightening.  My biggest concern at the time when we were talking about it was a local garage doing things like sitting at a street corner and turning on check engine lights hoping to increase business but now I wonder about things like insurance scams and personal injury lawsuits.
J_Brandt
50%
50%
J_Brandt,
User Rank: Apprentice
12/27/2013 | 11:04:03 AM
Scary not Cool
I'm not sure I'd say they are "cool."  They are scary in that as we computerize and make everything wireless, we are not paying enough attention to security.  It was bad enough to have my computer hacked.  Now it just gets worse.  Getting killed as youe car gets hacked, environmental disasters causes by hacking, ships running aground caused by hacking – sounds like a disaster movie on the SyFy channel.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8891
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors...

CVE-2014-8892
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via un...

CVE-2015-1170
Published: 2015-03-06
The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a "kernel administrator check," which allows local users to gain administrator privileges via unspecified API call...

CVE-2015-1637
Published: 2015-03-06
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for r...

CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.