Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Hackers Taking Over Your Car By @MissKatherineLK | @ThingsExpo #IoT
Imagine speeding down the highway when all of a sudden your brakes give out and your speed increases

Hackers Taking Over Your Car
By Katie Kennedy

A recent purchase of mine was a 2015 Jeep. Until now, I thought it was a safe and reliable car, but that is not the case anymore. As technology advances and cars become smarter and more technologically savvy, they become another target for hackers.

Imagine speeding down the highway, zooming past 18-wheelers, SUVs and coupes, when all of a sudden your brakes give out and your speed increases. Instantly, you think what could be wrong with the car, you pump your breaks and check your dash and there is no sign of stopping. Instant panic washes over you and a feeling of dread drowns out the honking horns. This is what could happen with the hackable car systems.

Hackers Charlie Miller and Chris Valasek have successfully, wirelessly hijacked the Jeep Cherokee. Previously, Miller and Valasek had compromised a Ford Escape and a Toyota Prius, although for these hacks, the attacker’s PC had to be physically wired into the vehicles’ on board diagnostic port. This port is where repair technicians have access to information on the car’s electronically controlled systems. Controlling the car from a close proximity and a physical connection was limiting for hackers. Now it can be done from anywhere in the world. Miller observed, “when you lose faith that a car will do what you tell it to do… it really changes your whole view of how the thing works.”

In 2012, Miller and Valasek were inspired by the UCSD and University of Washington study to apply for a car-hacking research grant from DARPA. Miller, a security researcher for Twitter and former NSA hacker, and Valasek, the director of vehicle security research at the consultancy IOActive, ended up with $80,000, that purchased a Toyota Prius and Ford Escape. With these two vehicles, they were able to completely take over the car’s system and control it with a beat-up Mac laptop. This was when they had to be physically connected to the car’s computer. That all changed with a car’s Wi-Fi network, shifting the hack to become completely virtual.

When Miller and Valasek hacked the Jeep Cherokee, they had the ability to lower speeds and fully kill the engine, abruptly employ the breaks or completely disable them. Currently, they can only gain access to the wheel when the Jeep is in reverse. The GPS in the Jeep can be tracked, so hackers can track the car, measure the speed and drop pins in the map to trace its route.

Due to Miller and Valasek’s work, Senators Ed Markey and Richard Blumenthal plan on introducing an automotive security bill that will set new digital security standards for cars and trucks. This bill was first sparked when Markey noted Miller’s and Valasek’s work in 2013.

The findings of Miller and Valasek’s do not only highlight Jeep’s vulnerabilities, instead, they suggest that any modern vehicle could be vulnerable. With the increased demand for the latest technology in cars, security measures are falling behind. Some companies are taking the necessary steps in counteracting the security flaws, while others are not doing anything at all. To have the ability to hack any vehicle from any location is detrimental. With Wi-Fi, Bluetooth, cellular service and radios, technology is changing the auto industry. To make sure automobiles do not turn into death traps, security should be high priority for auto companies.

Find out more information on Miller and Valasek’s hack here on Wired.

Related articles

The post Hackers Taking Over Your Car appeared first on CTOvision.com.

Read the original blog entry...

About Bob Gourley
Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Latest Cloud Developer Stories
92% of enterprises are using the public cloud today. As a result, simply being in the cloud is no longer enough to remain competitive. The benefit of reduced costs has normalized while the market forces are demanding more innovation at faster release cycles. Enter Cloud Native! C...
Blockchain has shifted from hype to reality across many industries including Financial Services, Supply Chain, Retail, Healthcare and Government. While traditional tech and crypto organizations are generally male dominated, women have embraced blockchain technology from its incep...
Blockchain has shifted from hype to reality across many industries including Financial Services, Supply Chain, Retail, Healthcare and Government. While traditional tech and crypto organizations are generally male dominated, women have embraced blockchain technology from its incep...
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabli...
Cloud Storage 2.0 has brought many innovations, including the availability of cloud storage services that are less expensive and much faster than previous generations of cloud storage. Cloud Storage 2.0 has also delivered new and faster methods for migrating your premises storage...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
Most Read This Week
ADS BY GOOGLE