Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Car Hacking Shifts Into High Gear
Threaded  |  Newest First  |  Oldest First
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
7/24/2015 | 7:40:26 AM
No foolproof solution
As much as I would love for someone to come up with a system that makes it impossible to hack a car, I don't see that being possible with the introduction of more over the air updates. Unless some sort of hardware key is needed to make updates to a system? 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:41:28 AM
Re: No foolproof solution
That's not such as bad idea. But even then you still run into another avenue for which you could be attacked. IE the company providing the update. If the company is exploited even with a hardkey you could end up downloading a malicious package to your vehicle. But "what you have" should definitely minimize the risk further.
Krenner
50%
50%
Krenner,
User Rank: Apprentice
7/24/2015 | 8:42:12 AM
Re: No foolproof solution
AND there is a Car Hacking Village at DEFCON this year!!  If youre going to Black Hat, go to Charlie's talk...then stay an extra day and go to the village!
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:51:46 AM
Re: No foolproof solution
I wanted to go to blackhat this year but had too much going on when it occurs. Next year, hopefully when car technology becomes more prevalent they will continue to display car hacking.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:01:06 PM
Re: No foolproof solution
It is probably not going to be like hack-free platform, but we can always isolate components in a way that they do not infect each other and hacker can not reach out to core system, such as turning the car engine off.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/24/2015 | 8:50:06 AM
Live Test
I would be furious if someone performed a live test on me in a facet of life that is as dangerous as driving.

I think at somepoint we need to look at ourselves to solve this issue between personality types. The "skeptics" and the "believers". The "skeptics" need to be less skeptical and start believing from similar test cases that possibilities such as hacking a car are very possible. And on the flip side, the "believers" need to not go out of there way to prove a point if it is dangerous such as hacking a car at high speed.
lancop
50%
50%
lancop,
User Rank: Apprentice
7/24/2015 | 3:11:50 PM
The IoT: no thanks!
If I've learned anything from my computer security work it is that any device with an internet connection is potentially hackable. Do I want to drive in a hackable car, or fly in a hackable airplane, or expose my loved ones to nerdy sociopaths thru my home appliances? No thanks! You can call the Internet of Things innovation if you want to, but it seems like a really creative way to make your life as risky as possible for the sake of "cool features" that are of questionable long-term value to a mature adult.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:03:37 PM
Re: The IoT: no thanks!
True. We have not come to home security yet. More and more devices at home are being connected, that seems they carry more risks now.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
7/26/2015 | 7:09:40 PM
a jump on the bad guys
The good-news takeaway here is that Miller & Valasek so far have had a jump on the bad guys with their research, as does Virginia with its research project on VA State Police car hacking. As Valasek said, Chrysler isn't responding to a malicious 0day attack right now with its patch & recall. It's the good guys calling, so they need to respond.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 12:06:02 PM
Re: a jump on the bad guys
I hear you. Until some bad guys cause some financial loss to Chrysler, they may not have any incentive to listen. That is how we deal with security no prevention until needed and when it is too late. :--))
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/28/2015 | 11:57:25 AM
We knew it
 

We knew that the cares are getting smarter and nobody pays attention security aspect of it. Hopefully a few individuals are taking initiative and demonstrating us that this is real, nothing fake.


Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-9501
PUBLISHED: 2019-10-22
The Artificial Intelligence theme before 1.2.4 for WordPress has XSS because Genericons HTML files are unnecessarily placed under the web root.
CVE-2019-16971
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\messages\messages_thread.php uses an unsanitized "contact_uuid" variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS.
CVE-2019-16972
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\contacts\contact_addresses.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
CVE-2019-16973
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.
CVE-2015-9496
PUBLISHED: 2019-10-22
The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.