. | . |
Connected cars moving targets for hackers By Julie JAMMOT Las Vegas (AFP) Jan 10, 2020 As cars evolve into rolling mobile computers, the potential for disastrous cyber attacks has become a new road hazard. Israeli cybersecurity firm GuardKnox demonstrated the threat in a Formula 1 driving simulation at the Consumer Electronics show this week in Las Vegas. Moments into the virtual drive, a GuardKnox engineer playing the role of hacker struck and the steering wheel no longer controlled the speeding car. The faux race was over for the driver, stuck on the side of the road in a scenario that cybersecurity specialists say could become very real. New car models are packed with computer chips, sensors and mobile technology that hackers could exploit to sabotage systems or commandeer controls. Opportunities for attacks are being revved up by the trend of self-driving, electric cars communicating in real-time with the cloud, smart city infrastructures, and one another. GuardKnox chief executive Moshe Shlisel gave an example of a hacker remotely taking control of a fuel tanker truck, sending it to crash into a building. "It's September 11 on wheels," Shlisel said in an interview at CES. Cybersecurity has become as integral to vehicle engineering as crash safety and fuel efficiency, according to Henry Bzeih, a former member of the Council for Automobile Cybersecurity, who spoke at the Las Vegas event. "Connectivity is the reason why this is happening," Bzeih said. "Now, all elements have to be designed with cybersecurity in mind." - 'Anything is possible' - Israeli startup Upstream logged more than 150 cybersecurity incidents involving automobiles last year, twice as many as in 2018. The majority of those hacks involve remotely car door locks, but an increasing number targeted software applications or connections to the cloud. Last year in Chicago, dozens of luxury cars were stolen by hacking Daimler's Car2Go app. "The ultimate worst-case scenario would be if somebody applies one of the car functions when it's not supposed to do that, and does that across multiple vehicles," said Upstream vice president Dan Sahar. "For example, someone hits the brakes on all vehicles of a specific model at the same time. That would be catastrophic." Since cars in model lines share engineering specifications, they share system vulnerabilities by design. "If you can design an attack and execute it on a computer, and that computer is attached to a car, anything is possible," said Ralph Echemendia, expert in cybersecurity and self-described "ethical hacker." Five years ago, a pair of cybersecurity researches remotely commandeered the controls of a Jeep Cherokee by taking advantage of a vulnerability in its infotainment system, triggering a recall of vehicles. - Never-ending battle - Carmakers have responded to the menace by offering bounties for vulnerabilities found by researchers and paying partners to build security into components. Upstream collects data shared to the cloud by vehicles, scouring it in real time for strange activity that could signal hackers are up to no good. GuardKnox engineers drew on their experience in the Israeli air force to design a processor that protects computers in vehicles and also serves as a secure operating system. As in the world of smartphones and desktop computing, hackers relentlessly seek ways to infiltrate new software or features in automobiles in an ever-escalating battle with defenders.
Main points of Carlos Ghosn's press conference Beirut (AFP) Jan 8, 2020 Fugitive ex-Nissan boss Carlos Ghosn mounted a feisty defence Wednesday in Beirut, where he made his first public appearance since skipping bail in Japan 10 days ago. He skirted the conditions of his escape but tackled most questions during a news conference that lasted more than two hours. Herewith the main points: - How did he escape? - Media outlets have reported a variety of colourful details about his escape from bail, including how he had boarded a bullet train, hid in a box and switch ... read more
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |