Wednesday, July 22, 2015

Jeep controlled by hackers – a serious threat – Money.pl

2015-07-22 13:00

 Jeep controlled by hackers - a serious threat

Fig. Jeep

The two hackers on the example of the new Jeep Cherokee shows how easy it is to break into a car management system and lead to an accident. Hacker attacks on cars may soon be a huge threat.

Charlie Miller and Chris Valasek, two American hackers finished experiment showing how tragic the consequences can have a break-in to the system management of modern cars. The workshop was taken Jeep Cherokee , which currently special software that allows remote control of selected functions of the car.

The work lasted a year, but their effects are frightening. Wired magazine journalist got behind the wheel of the Cherokee and went for a short ride. At the same time, A couple of hackers sitting a few dozen kilometers away, he disrupted his life.

It began very innocently, from turning the air conditioning vents. Then there was the picture appears on the screen hackers multimedia system, changing the radio station or, finally, lock brakes.

What’s more, hackers also show that when reverse course they can take control of the steering and as a result, remote control Jeep Cherokee.

Everything is possible by holes in system software media and remote connectivity card SIM with Internet access. Such solutions are increasingly being used in new cars and few people know that hackers are able through one gap to get through the CAN bus driver and get access to all the electronic systems of the vehicle.

It is not difficult to imagine what could happen if one moment in hundreds of vehicles is jammed central locking and tightened the brakes while driving. The solution of this particular hole in the software is install the update, which was recently released Jeep.

Interestingly, only a few car manufacturers however trying to take care of protection against such attacks. In the future, when the roads will be rode a lot more cars with network access and an even larger number of multimedia solutions, similar attacks could become a real threat.

LikeTweet

No comments:

Post a Comment