vehicles

now browsing by tag

 
 

#sextrafficking | Social Media Posts Describing Predators Scrawling Letters and Numbers on Vehicles, Not Proven, Says EPD and HCSO – Redheaded Blackbelt | #tinder | #pof | #match | romancescams | #scams

[Staged photo from the EPD] After receiving multiple people asking if the 1F/1C written in the dust on cars social media posts were real, we reached out the the Humboldt […] View full post on National Cyber Security

6 charged with stealing checks from Anchorage mail and vehicles to get cash

Source: National Cyber Security – Produced By Gregory Evans

Six Anchorage residents have been charged with stealing checks from the mail and vehicles and using them to get cash at banks and stores across the city over a 10-month period, the U.S. Attorney’s Office said Thursday. Acting U.S. Attorney Bryan Schroder said in a prepared statement that Sara James,…

The post 6 charged with stealing checks from Anchorage mail and vehicles to get cash appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Connected Cars Could Be Assassination Vehicles

WP-Cyberspace-620x400

The US Attorney General’s Office has warned that rogue nation states could remotely hack vehicles for the purpose of killing their ideological or geopolitical enemies.

“There is no Internet-connected system where you can build a wall that’s high enough or deep enough to keep a dedicated nation-state adversary or a sophisticated criminal group out of the system,” US Assistant AG John Carlin said, speaking at a Society of Engineers event this week in Detroit. “This will be the next battlefront.”

He added, “If you were able to do something that could affect a large scale of an industry—like 100,000 cars—you could see that being in the arsenal of a nation-state’s tool kit is a new form of warfare. We’ve seen rogue nation states try to assassinate those that do not share their beliefs. If they were able to do it remotely through a car, I don’t see why they consider that a safe zone.”

Carlin’s comments follow the highly publicized Jeep hack last fall, in which two white-hat hackers were able to remotely access a Jeep’s internal system, including its brakes, steering and AV systems—access that could certainly be used to eliminate passengers. That incident prompted the recall of almost 1.5 million vehicles—the first auto recall prompted by cybersecurity concerns.

By 2020, there will be nearly 21 billion devices connected to the Internet, including up to 22% of passenger vehicles worldwide, according to IDC. And overall, there is a growing awareness of connected car security, which is driving more investment in the space—to the tune of $1.27 billion by 2020, says BI Intelligence, Business Insider’s premium research service. Traditional IT security practices like network monitoring and segmentation will also become even more critical.

“The automotive industry has been stepping up to the challenge of hardening cars against cyberattacks,” said David Barzilai, chairman and co-founder of Karamba Security, via email. Karamba’s goal is to partner with companies that build connected car systems and provide them with the Karamba auto-security endpoint product. “All major car companies and every major system provider have created cyber-teams that direct a more secure development of the cars and car controller. Karamba Security believes that the best method is to block hackers before they hack into the car. This mission is achieved by hardening cars’ externally connected controllers according to factory settings. All foreign codes are then blocked from penetrating the car’s safety-related systems and risking drivers’ lives.”

That said, research from Veracode recently revealed that automotive manufacturers on average have a security lag of up to three years before systems catch up with cyber-threats.

“What we’re seeing happen in the auto industry is a microcosm of what’s happening in financial services, healthcare and virtually every other sector—applications are not created with security in mind, creating a major area of risk,” said Chris Wysopal, CTO, Veracode. “Exposing a car to the internet makes it vulnerable to cyber-attack due to poorly written software, which could render the car unstable or dangerous. Building a secure application development program is a significant challenge for manufacturers, which is compounded by the need to do so under the microscope of government regulated safety standards and liability concerns.”
Source:http://www.infosecurity-magazine.com/news/attorney-general-connected-cars/

Related Post

The post Connected Cars Could Be Assassination Vehicles appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com

Delhi police install cameras on patrol car doors to help in hunt for stolen vehicles

Source: National Cyber Security – Produced By Gregory Evans

Delhi police install cameras on patrol car doors to help in hunt for stolen vehicles

While Delhi Police have launched a slew of mobile apps for reporting crime, its South district branch has set up a new app to track stolen vehicles parked on streets. A special camera is installed at PCR vans which will register the number plates of vehicles parked on the streets. The camera is equipped with special software which will further match the data captured with the data of stolen vehicles. Though the project is launched on trial basis, soon the entire unit of Delhi Police will start using the app. According to South district police officials, this technology will improve the cops’ efficiency to trace stolen vehicles. Prem Nath, Deputy Commissioner of Police, South District, told Mail Today that ‘Vehiscan’ is on trial run and things will be finalised after some time. “We have used this technology in various areas of Saket and Mehrauli where it performed effectively. Currently we are using it for stolen vehicles but soon it will be used to trace vehicles involved in other crimes as well,” he added. “Recently, we have started using this technology and successfully found five expensive cars stolen from various parts of Delhi,” a senior police official said. Explaining the technology, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Delhi police install cameras on patrol car doors to help in hunt for stolen vehicles appeared first on National Cyber Security.

View full post on National Cyber Security

Fiat-Chrysler recalls 1.4 million vehicles in wake of hack

Source: National Cyber Security – Produced By Gregory Evans

We were waiting for the other shoe to drop, and here it is: Fiat Chrysler Automobiles (FCA) has announced it is voluntarily recalling 1.4 million vehicles across its various brands and model lines, in the wake of the discovery of a zero-day exploit that lets hackers remotely force late-model Jeep Cherokees off the road. All someone needs is the IP address of a car armed with Chrysler’s UConnect infotainment system, and they can infiltrate the car’s network via its Wi-Fi hotspot feature, rewrite the OS firmware, and then control all of the major systems of the car: accelerator, brakes, steering, air conditioning, and more. Here’s the main text of the FCA recall press release: “The recall aligns with an ongoing software distribution that insulates connected vehicles from remote manipulation, which, if unauthorized, constitutes criminal action… Further, FCA US has applied network-level security measures to prevent the type of remote manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems and were fully tested and implemented within the cellular network on July 23, 2015.” The hack also lets someone remotely monitor the car’s location via GPS tracking, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Fiat-Chrysler recalls 1.4 million vehicles in wake of hack appeared first on National Cyber Security.

View full post on National Cyber Security

Hacker: ‘Hundreds of thousands’ of vehicles are at risk of attack

Source: National Cyber Security – Produced By Gregory Evans

A security expert who recently demonstrated he could hack into a Jeep and control its most vital functions said the same could be done with hundreds of thousands of other vehicles on the road today. Security experts Charlie Miller and Chris Valasek collaborated with Wired magazine to demonstrate how they could remotely hack into and control the entertainment system as well as more vital functions of a 2015 Jeep Cherokee. Both hackers are experienced IT security researchers. Miller is a former NSA hacker and security researcher for Twitter and Valasek is the director of security research at IOActive, a consultancy. As the Wired reporter drove the vehicle on a highway, the hackers were able to manipulate its radio and windshield wipers and even shut the car down. The vehicle hack took place as Wired reporter Andy Greenberg drove the Jeep Cherokee on Rte. 40 in St. Louis. The hackers were 10 miles away at the time. The hackers said they were able to use the cellular connection to the Jeep’s entertainment system or head unit to gain access to other systems; a vehicle’s head unit is commonly connected to various electronic control units (ECUs) located throughout a modern vehicle. There […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hacker: ‘Hundreds of thousands’ of vehicles are at risk of attack appeared first on National Cyber Security.

View full post on National Cyber Security