Dear Visitor,

Our system has found that you are using an ad-blocking browser add-on.

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge.

Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site.

Continue on this site freely
You are here: Home / Viruses & Malware / Tesla Joins Chrysler, GM on Hack List
Tesla Joins Chrysler, General Motors on Car Hack List
Tesla Joins Chrysler, General Motors on Car Hack List
By Jennifer LeClaire / CRM Daily Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
It seems Relevant Products/Services hacking is the latest pastime. The Tesla Model S is the most recent example of a car with flaws in its computer software that could put drivers in danger.

Kevin Mahaffey, co-founder and CTO of cybersecurity startup Lookout, and Marc Rogers, a security researcher at hacker protection firm CloudFlare, plan to show the world how hackers can remotely hijack the vehicle at the Def Con hacking conference in Las Vegas Friday. Apparently, anybody who has physical access to the interior of the Model S can inject malware into the system that gives that individual complete control.

“We identified six vulnerabilities in the Model S that ultimately resulted in the ability to, with initial physical access to the car, gain full control over the vehicle’s infotainment system and be able to perform any action accessible to the center touch screen or Tesla’s smartphone app,” Mahaffey explained. “In one case, we were able to turn off the car while it was driving.”

Over-the-Air Patching

Connected cars are effectively computers on wheels, Mahaffey said. To realistically patch vulnerabilities at the frequency they are discovered -- instead of issuing a mass recall like Chrysler did -- manufacturers need to implement over-the-air patching systems into every connected car, he said. Tesla has such a system.

“In the past, security teams relied on a ‘perimeter’ security architecture to protect their systems. That is to say, hard on the outside and soft and chewy on the inside,” Mahaffey said.

“As the story went, if you kept attackers outside the gates, you didn’t have to worry so much about protecting the systems inside the gates," he said. "Time has proven, however, that it’s practically impossible to completely prevent attackers from getting inside the perimeter. There are simply too many vectors to defend.”

What’s the Answer?

Chrysler, General Motors and now Tesla have discovered that the hard way.

In July, a security flaw was discovered in the Jeep Cherokee’s Connect vehicle-connectivity system. Two white hat hackers -- Charlie Miller and Chris Valise -- tapped into the flaw while a reporter drove the vehicle down the highway.

The hackers successfully -- and remotely -- turned up the radio as loud as it would go and switched on the windshield wipers. They also cut off the transmission and disconnected the brakes. The Jeep ended up in a ditch.

A few days later, security researcher Samy Kamkar hacked General Motors’ (GM) OnStar in-vehicle system. Kamkar posted a YouTube video revealing what he called “OwnStar,” a device that intercepts GM’s OnStar Remote Link mobile app. He claimed OwnStar can locate, unlock and even remotely start cars that come equipped with the OnStar system.

We asked Jon Gelsey, CEO of identity infrastructure firm Auth0, for his thoughts on the car hacks. He told us the good news is that companies everywhere -- not just Tesla -- are becoming more aware of the security risks that come along with increasingly complex, increasingly accessible, in-demand technologies.

Unfortunately, there’s also some not-so-good news. Gelsey said it’s still a challenge to keep up with this ever-changing tech environment.

“The easiest way companies can stay ahead of hackers is to acknowledge that their developers can’t be expected to be experts across every subspecialty of the development chain, and utilize security-as-a-service platforms that keep up with the vulnerabilities for them," he said.

Tell Us What You Think


Like Us on FacebookFollow Us on Twitter
© Copyright 2018 NewsFactor Network. All rights reserved. Member of Accuserve Ad Network.