Hoping to access and remotely take charge of a vehicle’s operating system via your laptop? Expect to shower with strange men in a place where the Wi-Fi sucks.
Life behind bars is the penalty proposed by two Michigan senators seeking to regulate the state’s connected and autonomous vehicle industry, Automotive News reports.
The bills introduced yesterday make it a super-duper felony to intentionally access a vehicle’s electronic system for the purpose of damaging it or gaining control of the vehicle. (Read More…)
Apparently, it’s Technology Tuesday here at TTAC, so we can bring you news of a device that will kick your deeply held fears to the curb.
Vehicle hacking has been an issue ever since a Jeep Cherokee had its steering, transmission and brakes commandeered last summer, and an Israeli firm is now offering protection against keyboard warriors, according to CNBC (via Business Insider).
Hackers say they may be able to control any vehicle with a telematics-enabled sensor — including a popular sensor that insurance companies use for consumers — plugged into the car’s diagnostic port, according to Wired report (via The Verge).
In recent weeks, several hacks have surfaced — Chrysler, General Motors and Telsa — related to specific automakers. According to the report, the On-Board Diagnostic system hack could apply to any make or model fitted with an insurance or tracking dongle. The University of California San Diego researchers say they’ll present their findings at the Usenix conference Tuesday.
And, um, there’s no easy way to put this, but … it doesn’t appear that it would be all that hard to find cars with the dongles at the moment.
As the technology that will one day network cars together and reorganize the roads in the name of safety and efficiency continues to rush towards us, word comes that the computerized systems used to control commercial aircraft in flight are now vulnerable to hackers via android devices. Net-Security.org is reporting on an April 10th presentation at the “Hack in the Box Conference” by German security consultant Hugo Teso during which he demonstrates how a wireless device can be used to transmit malicious code into an aircraft’s computer through at least two different systems currently used to exchange information between aircraft and ground stations. Those of you who are already afraid to fly will want to read all of the excruciating details here: http://www.net-security.org (Read More…)