Today it seems that nearly every venerable product is being updated, refreshed, and otherwise reworked to satisfy the public’s insatiable demand for networked technology. Where we once had phones, we now have smart phones where making calls is only the beginning of the capabilities of these hand-held computers. Computerized features have been added to a myriad of consumer products including refrigerators, door bells, barbeque grills (yes, really!), home thermostats, televisions and home entertainment systems. These “smart” electronics promise to offer consumers improved usability, efficiency, personalization and other benefits.
While many of the underlying systems in vehicles have already been computerized, the latest step in this trend of computerization of consumer products has now moved into the consumer-facing systems in cars, trucks and SUVs. These changes have likewise promised consumers improved personalization & customization, enhanced safety, and more efficient driving. However, technology is a tool and like all tools it can be leveraged for good and bad intentions. While these improvements are exciting for consumers, they are also enticing for hackers and their technological attacks that could result in massive accidents, snarled traffic on roadways and more.
Are Computerized Cars Safe?
Before we proceed any further, it is important to note that while the terms is often thrown around to scare people, not all hackers have a nefarious purpose. In fact, some hackers will disclose exploits to the manufacturer before releasing the code. The main concerns regarding hacking and smart cars is probably focused on an attack designed to disrupt or lock-up the nation’s transportation grid, a worm that proliferates and propagates beyond the author’s intent and control (See: ILOVEYOU worm, Melissa virus, Blaster worm, and others), or ransom-ware that locks down a vehicle unless the owner pays the extortion fee.
Security expert, Chris Valasek, who was able to seize control of a 2010 Toyota Prius and Ford escape over the OBD port typically used by mechanics characterizes today’s cars as “rolling computers.” Unfortunately he is not the only individual who has identified weak links in these vehicles security systems. A Department of Defense-funded security assessment performed on an undisclosed 2012 model also resulted in hackers seizing control of the vehicle by creating something akin to a digital master key for all of the vehicle’s systems.
Even the poster-child of the electric and smart car movement, the Tesla S, is not immune to this risk. Tesla owners & enthusiasts themselves have taken to hacking the car and its systems to see what types of things it is capable of. By interfacing with the on-board computer through a standard Ethernet port, these individuals were able to monitor the data being transmitted through the systems, display the Firefox web browser on the center console, discovered a number of open and insecure ports, and discovered that one of the sub-systems was running on the common Linux distribution, Ubuntu.
However, perhaps more concerning is that over the summer hackers at the security conference Syscan 360 discovered and announced exploits that could be used maliciously in the Tesla S. These individuals were apparently able to gain control over the vehicle’s headlights, locks, skylight and horn while the car was in motion. This means that it is theoretically possible for a malicious individual to cut your headlights as you enter a dangerous stretch of roadway. However, the hacks that were revealed fell short of the goals set by conference organizers. A $10,000 prize was available to anyone able to demonstrate a hack that takes control of the vehicle’s engine and could open the doors.
Put our auto accident experience to work for you
As computer systems on vehicles become more and more complex, the potential number of vectors for errors and malicious acts only increases. In a world where vehicles have been affected by unintended acceleration, defective ignition switches, and exploding airbags the safety of a car’s control systems is of paramount concern. The failure to secure these systems from attack increases the likelihood that serious accidents and other consequences may occur. If you suspect that a defect in the computer systems or other systems in your vehicle caused a serious accident, Fayetteville AR personal injury lawyer Ken Kieklak today by calling (479) 316-0438 or contact us online.
Sciatica is a condition that occurs when pain radiates down the sciatic nerve. This particular nerve runs down from your lower back, through your hips, and down each leg. Usually, sciatica will only affect one side of a person’s body. The underlying cause usually is a...
Life is rarely a straight and uninterrupted path. Events and circumstances pull folks in many directions. A work-related injury could easily impact your plans. Some people are required to move out of state for personal or economic reasons. Moving is a stressful event...
Your eligibility for Social Security Disability benefits if you have previously committed a crime depends on a number of factors. If your disability stems from the commission of a crime or if you are evading arrest and prosecution, you will not be eligible for...
Osteoarthritis is a degenerative joint disease that could affect any joint in your body, including your hands and wrists. When the cartilage between your joints slowly wears down, your bones will painfully rub together without any protective cushion. When your joints...