TechHive: Defcon researchers reveal tricks behind their car hack

TechHive
TechHive helps you find your tech sweet spot. We guide you to products you'll love and show you how to get the most out of them. 
thumbnail Defcon researchers reveal tricks behind their car hack
Aug 3rd 2013, 17:45, by Lucian Constantin, IDG News Service

LAS VEGAS—Two security researchers at Defcon 21 here on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, brakes, and other important functions.

Charlie Miller, a security engineer at Twitter, and Chris Valasek, director of security intelligence at IOActive, spent ten months researching how they could hack into the network of embedded computer systems called electronic control units (ECUs) used in modern cars and see what they could do once they gained access to it.

Their test cars were a 2010 Ford Escape and a 2010 Toyota Prius.

Some of the things they were able to achieve by hooking a laptop to the ECU communications network and injecting rogue signals into it included disabling the breaks while the car was in motion, jerking the steering wheel, accelerating, killing the engine, yanking the seat belt, displaying bogus speedometer and fuel gauge readings, turning on and off the car's lights, and blasting the horn.

To read this article in full or to leave a comment, please click here

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Previous
Next Post »