FBI warns on risks of car hacking

InfotainmentBBC .com | 18 March 2016

The FBI and the US National Highway Traffic Safety Administration have added their voices to growing concerns about the risk of cars being hacked.

In an advisory note it warns the public to be aware of “cybersecurity threats” related to connected vehicles.

Last year Fiat Chrysler recalled 1.4 million US vehicles after security researchers remotely controlled a Jeep.

People who suspect their car has been hacked were told to get in contact with the FBI.

The public service announcement laid out the issues and dangers of car hacking.

“Modern motor vehicles often include new connected vehicle technologies that aim to provide benefits such as added safety features, improved fuel economy and greater overall convenience,” it read.

“With this increased connectivity, it is important that consumers and manufacturers maintain awareness of potential cybersecurity threats.”

A Jeep Grand CherokeeImage copyrightfiat-chrysler
Image captionJeep’s Grand Cherokee was recalled after researchers showed it could be remotely attacked

It went on to offer tips to both drivers and manufacturers including:

  • Ensuring vehicle software is up-to-date
  • Keeping an eye out for recalls
  • Being careful when making modifications to vehicle software
  • Exercising discretion when connecting third-party devices to vehicles
  • Being aware of who has physical access to vehicles

The FBI also warned that criminals may latch on to online vehicle software updates by sending out fake messages that trick users into ” opening attachments containing malicious software”.

Both General Motors and BMW have recently issued security updates to mitigate the risk of remote attacks that would have allowed hackers to open doors and, in the case of GM, start the engine.

Fiat Chrysler was forced to recall millions of vehicles after Wired magazine demonstrated how hackers could remotely take control of car functions, including steering and brakes.

However, there has not yet been a real-world example of such hacking.




Tinggalkan Balasan

Isikan data di bawah atau klik salah satu ikon untuk log in:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout / Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout / Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout / Ubah )

Foto Google+

You are commenting using your Google+ account. Logout / Ubah )

Connecting to %s

%d blogger menyukai ini: