Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Car Hacking Shifts Into High Gear
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:06:02 PM
Re: a jump on the bad guys
I hear you. Until some bad guys cause some financial loss to Chrysler, they may not have any incentive to listen. That is how we deal with security no prevention until needed and when it is too late. :--))
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:03:37 PM
Re: The IoT: no thanks!
True. We have not come to home security yet. More and more devices at home are being connected, that seems they carry more risks now.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:01:06 PM
Re: No foolproof solution
It is probably not going to be like hack-free platform, but we can always isolate components in a way that they do not infect each other and hacker can not reach out to core system, such as turning the car engine off.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 11:57:25 AM
We knew it
 

We knew that the cares are getting smarter and nobody pays attention security aspect of it. Hopefully a few individuals are taking initiative and demonstrating us that this is real, nothing fake.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/26/2015 | 7:09:40 PM
a jump on the bad guys
The good-news takeaway here is that Miller & Valasek so far have had a jump on the bad guys with their research, as does Virginia with its research project on VA State Police car hacking. As Valasek said, Chrysler isn't responding to a malicious 0day attack right now with its patch & recall. It's the good guys calling, so they need to respond.
lancop
50%
50%
lancop,
User Rank: Apprentice
7/24/2015 | 3:11:50 PM
The IoT: no thanks!
If I've learned anything from my computer security work it is that any device with an internet connection is potentially hackable. Do I want to drive in a hackable car, or fly in a hackable airplane, or expose my loved ones to nerdy sociopaths thru my home appliances? No thanks! You can call the Internet of Things innovation if you want to, but it seems like a really creative way to make your life as risky as possible for the sake of "cool features" that are of questionable long-term value to a mature adult.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:51:46 AM
Re: No foolproof solution
I wanted to go to blackhat this year but had too much going on when it occurs. Next year, hopefully when car technology becomes more prevalent they will continue to display car hacking.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:50:06 AM
Live Test
I would be furious if someone performed a live test on me in a facet of life that is as dangerous as driving.

I think at somepoint we need to look at ourselves to solve this issue between personality types. The "skeptics" and the "believers". The "skeptics" need to be less skeptical and start believing from similar test cases that possibilities such as hacking a car are very possible. And on the flip side, the "believers" need to not go out of there way to prove a point if it is dangerous such as hacking a car at high speed.
Krenner
50%
50%
Krenner,
User Rank: Apprentice
7/24/2015 | 8:42:12 AM
Re: No foolproof solution
AND there is a Car Hacking Village at DEFCON this year!!  If youre going to Black Hat, go to Charlie's talk...then stay an extra day and go to the village!
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:41:28 AM
Re: No foolproof solution
That's not such as bad idea. But even then you still run into another avenue for which you could be attacked. IE the company providing the update. If the company is exploited even with a hardkey you could end up downloading a malicious package to your vehicle. But "what you have" should definitely minimize the risk further.
Page 1 / 2   >   >>


AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16317
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
CVE-2019-16318
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.
CVE-2019-16307
PUBLISHED: 2019-09-14
A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 allows remote attackers to inject arbitrary web script or HTML via the handle parameter (webExMeetingLogin.jsp) and meetingKe...
CVE-2019-16294
PUBLISHED: 2019-09-14
SciLexer.dll in Scintilla in Notepad++ (x64) before 7.7 allows remote code execution or denial of service via Unicode characters in a crafted .ml file.
CVE-2019-16309
PUBLISHED: 2019-09-14
FlameCMS 3.3.5 has SQL injection in account/login.php via accountName.