Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Car Hacking Shifts Into High Gear
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:06:02 PM
Re: a jump on the bad guys
I hear you. Until some bad guys cause some financial loss to Chrysler, they may not have any incentive to listen. That is how we deal with security no prevention until needed and when it is too late. :--))
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:03:37 PM
Re: The IoT: no thanks!
True. We have not come to home security yet. More and more devices at home are being connected, that seems they carry more risks now.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:01:06 PM
Re: No foolproof solution
It is probably not going to be like hack-free platform, but we can always isolate components in a way that they do not infect each other and hacker can not reach out to core system, such as turning the car engine off.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 11:57:25 AM
We knew it
 

We knew that the cares are getting smarter and nobody pays attention security aspect of it. Hopefully a few individuals are taking initiative and demonstrating us that this is real, nothing fake.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/26/2015 | 7:09:40 PM
a jump on the bad guys
The good-news takeaway here is that Miller & Valasek so far have had a jump on the bad guys with their research, as does Virginia with its research project on VA State Police car hacking. As Valasek said, Chrysler isn't responding to a malicious 0day attack right now with its patch & recall. It's the good guys calling, so they need to respond.
lancop
50%
50%
lancop,
User Rank: Apprentice
7/24/2015 | 3:11:50 PM
The IoT: no thanks!
If I've learned anything from my computer security work it is that any device with an internet connection is potentially hackable. Do I want to drive in a hackable car, or fly in a hackable airplane, or expose my loved ones to nerdy sociopaths thru my home appliances? No thanks! You can call the Internet of Things innovation if you want to, but it seems like a really creative way to make your life as risky as possible for the sake of "cool features" that are of questionable long-term value to a mature adult.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:51:46 AM
Re: No foolproof solution
I wanted to go to blackhat this year but had too much going on when it occurs. Next year, hopefully when car technology becomes more prevalent they will continue to display car hacking.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:50:06 AM
Live Test
I would be furious if someone performed a live test on me in a facet of life that is as dangerous as driving.

I think at somepoint we need to look at ourselves to solve this issue between personality types. The "skeptics" and the "believers". The "skeptics" need to be less skeptical and start believing from similar test cases that possibilities such as hacking a car are very possible. And on the flip side, the "believers" need to not go out of there way to prove a point if it is dangerous such as hacking a car at high speed.
Krenner
50%
50%
Krenner,
User Rank: Apprentice
7/24/2015 | 8:42:12 AM
Re: No foolproof solution
AND there is a Car Hacking Village at DEFCON this year!!  If youre going to Black Hat, go to Charlie's talk...then stay an extra day and go to the village!
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:41:28 AM
Re: No foolproof solution
That's not such as bad idea. But even then you still run into another avenue for which you could be attacked. IE the company providing the update. If the company is exploited even with a hardkey you could end up downloading a malicious package to your vehicle. But "what you have" should definitely minimize the risk further.
Page 1 / 2   >   >>


US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3738
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Improper Verification of Cryptographic Signature vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.
CVE-2019-3739
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA keys.
CVE-2019-3740
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys.
CVE-2019-3756
PUBLISHED: 2019-09-18
RSA Archer, versions prior to 6.6 P3 (6.6.0.3), contain an information disclosure vulnerability. Information relating to the backend database gets disclosed to low-privileged RSA Archer users' UI under certain error conditions.
CVE-2019-3758
PUBLISHED: 2019-09-18
RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts.