Fiat Chrysler Automobiles will give you up to $1,500 to find weaknesses in its vehicles’ security, but cybersecurity experts want the automaker to pony up more dough.
After the company announced its industry-first “bug bounty” program on July 13, many professional hackers say FCA’s reward isn’t enough to attract real talent in the search for software breaches, Forbes reports. (Read More…)
In a few weeks, after Pokémon Go jumps the shark and we all head back to our homes for nights of solitude, Fiat Chrysler Automobiles will offer another opportunity for high-tech geekery. And a lucrative one, too.
Announced today, the automaker will hand tech-savvy individuals cold, hard cash in return for information on weaknesses in its vehicles’ cybersecurity. Exposing a hidden backdoor that hackers could sneak through will net you up to $1,500. (Read More…)
It looks like car thieves in Houston have found a way to break into (and make off with) Jeep and Ram vehicles without using a slim jim, crowbar or screwdriver.
Surveillance video from a Houston garage shows a Jeep Wrangler being methodically commandeered by a man using a laptop and tablet. After last year’s remote-control Grand Cherokee incident, this is another hacker-related headache for Fiat Chrysler Automobiles. (Read More…)
My email address [email protected], and this XKCD comic is a very real part of my life. Others confuse me for all sorts of other Wallachs out there in the world. I’ve been invited to bachelorette parties in New York, received electronic court filings from Florida, and recently I got something new: an email welcoming me to my new Lexus that invited me to take part in exclusive consumer surveys.
Of course, I didn’t recently purchase a Lexus, and there was no “hey, wrong email address” button anywhere to be found. So what did I do? I “forgot” my password, logged in to someone else’s Lexus account, and figured out who actually owned the Lexus. After all, they’d probably want to know.
Hoping to access and remotely take charge of a vehicle’s operating system via your laptop? Expect to shower with strange men in a place where the Wi-Fi sucks.
Life behind bars is the penalty proposed by two Michigan senators seeking to regulate the state’s connected and autonomous vehicle industry, Automotive News reports.
The bills introduced yesterday make it a super-duper felony to intentionally access a vehicle’s electronic system for the purpose of damaging it or gaining control of the vehicle. (Read More…)
Apparently, it’s Technology Tuesday here at TTAC, so we can bring you news of a device that will kick your deeply held fears to the curb.
Vehicle hacking has been an issue ever since a Jeep Cherokee had its steering, transmission and brakes commandeered last summer, and an Israeli firm is now offering protection against keyboard warriors, according to CNBC (via Business Insider).
Hackers say they may be able to control any vehicle with a telematics-enabled sensor — including a popular sensor that insurance companies use for consumers — plugged into the car’s diagnostic port, according to Wired report (via The Verge).
In recent weeks, several hacks have surfaced — Chrysler, General Motors and Telsa — related to specific automakers. According to the report, the On-Board Diagnostic system hack could apply to any make or model fitted with an insurance or tracking dongle. The University of California San Diego researchers say they’ll present their findings at the Usenix conference Tuesday.
And, um, there’s no easy way to put this, but … it doesn’t appear that it would be all that hard to find cars with the dongles at the moment.
As the technology that will one day network cars together and reorganize the roads in the name of safety and efficiency continues to rush towards us, word comes that the computerized systems used to control commercial aircraft in flight are now vulnerable to hackers via android devices. Net-Security.org is reporting on an April 10th presentation at the “Hack in the Box Conference” by German security consultant Hugo Teso during which he demonstrates how a wireless device can be used to transmit malicious code into an aircraft’s computer through at least two different systems currently used to exchange information between aircraft and ground stations. Those of you who are already afraid to fly will want to read all of the excruciating details here: http://www.net-security.org (Read More…)