Friday, September 6, 2013

Hackers find weaknesses in car computer systems

Business

Wednesday, September 04, 2013

As cars become more like PCs on wheels, what’s to stop a hacker from taking over yours?In recent demonstrations, hackers have shown they can slam a car’s brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers.The hackers are publicising their work to reveal vulnerabilities present in a growing number of car computers. All cars and trucks contain anywhere from 20 to 70 computers. They control everything from the brakes to acceleration to the windows, and are connected to an internal network. A few hackers have recently managed to find their way into these intricate networks.In one case, a pair of hackers manipulated two cars by plugging a laptop into a port beneath the dashboard where mechanics connect their computers to search for problems. Scarier yet, another group took control of a car’s computers through cellular telephone and Bluetooth connections, the compact disc player and even the tire pressure monitoring system.To be sure, the “hackers” involved were well-intentioned computer security experts, and it took both groups months to break into the computers. And there have been no real-world cases of a hacker remotely taking over a car. But experts say high-tech hijackings will get easier as automakers give them full Internet access and add computer-controlled safety devices that take over driving duties, such as braking or steering, in emergencies. Another possibility: A tech-savvy thief could unlock the doors and drive off with your vehicle.A diagnostic technician uses a laptop computer to diagnose and repair the brake system on a 2010 Toyota Prius. (PHOTO: AP)

HOUSE RULES


1. We welcome reader comments on the top stories of the day. Some comments may be republished on the website or in the newspaper – email addresses will not be published.


2. Please understand that comments are moderated and it is not always possible to publish all that have been submitted. We will, however, try to publish comments that are representative of all received.


3. We ask that comments are civil and free of libellous or hateful material. Also please stick to the topic under discussion.


4. Please do not write in block capitals since this makes your comment hard to read.


5. Please don’t use the comments to advertise. However, our advertising department can be more than accommodating if emailed:mailto:advertising@jamaicaobserver.com.


6. If readers wish to report offensive comments, suggest a correction or share a story then please email: community@jamaicaobserver.com.


7. Lastly, read our Terms and Conditions and Privacy Policy

comments powered by

View the original article here



Hackers find weaknesses in car computer systems