Web Site Design & Hosting, Greenville, South Carolina - Mojoe Logo
Web Site Design & Hosting, Greenville, South Carolina - Mojoe Logo

Why Surf the Net when you can Mojoe?

Web Site Design & Hosting, Greenville, South Carolina - Mojoe Logo Blog
Mojoe.net Weblog on Web Site, Web Design, Web Development, and General Info

Posts Tagged ‘Computer Hacking’

Hackers Remotely Kill a Jeep on the Highway—With Me in It

Wednesday, July 22nd, 2015

Hackers kill a jeep on the highway

Hackers and Your Car

Think your safe in your car? Well not anymore. Its becoming more and more likely that hackers will soon be targeting the onboard computer systems of your automobile. Read this article we obtained from Wired.com :

I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold.

Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started blasting cold air at the maximum setting, chilling the sweat on my back through the in-seat climate control system. Next the radio switched to the local hip hop station and began blaring Skee-lo at full volume. I spun the control knob left and hit the power button, to no avail. Then the windshield wipers turned on, and wiper fluid blurred the glass.

As I tried to cope with all this, a picture of the two hackers performing these stunts appeared on the car’s digital display: Charlie Miller and Chris Valasek, wearing their trademark track suits. A nice touch, I thought.

The Jeep’s strange behavior wasn’t entirely unexpected. I’d come to St. Louis to be Miller and Valasek’s digital crash-test dummy, a willing subject on whom they could test the car-hacking research they’d been doing over the past year. The result of their work was a hacking technique—what the security industry calls a zero-day exploit—that can target Jeep Cherokees and give the attacker wireless control, via the Internet, to any of thousands of vehicles. Their code is an automaker’s nightmare: software that lets hackers send commands through the Jeep’s entertainment system to its dashboard functions, steering, brakes, and transmission, all from a laptop that may be across the country.

To better simulate the experience of driving a vehicle while it’s being hijacked by an invisible, virtual force, Miller and Valasek refused to tell me ahead of time what kinds of attacks they planned to launch from Miller’s laptop in his house 10 miles west. Instead, they merely assured me that they wouldn’t do anything life-threatening. Then they told me to drive the Jeep onto the highway. “Remember, Andy,” Miller had said through my iPhone’s speaker just before I pulled onto the Interstate 64 on-ramp, “no matter what happens, don’t panic.”1
As the two hackers remotely toyed with the air-conditioning, radio, and windshield wipers, I mentally congratulated myself on my courage under pressure. That’s when they cut the transmission.

Immediately my accelerator stopped working. As I frantically pressed the pedal and watched the RPMs climb, the Jeep lost half its speed, then slowed to a crawl. This occurred just as I reached a long overpass, with no shoulder to offer an escape. The experiment had ceased to be fun.

At that point, the interstate began to slope upward, so the Jeep lost more momentum and barely crept forward. Cars lined up behind my bumper before passing me, honking. I could see an 18-wheeler approaching in my rearview mirror. I hoped its driver saw me, too, and could tell I was paralyzed on the highway.

“You’re doomed!” Valasek shouted, but I couldn’t make out his heckling over the blast of the radio, now pumping Kanye West. The semi loomed in the mirror, bearing down on my immobilized Jeep.
I followed Miller’s advice: I didn’t panic. I did, however, drop any semblance of bravery, grab my iPhone with a clammy fist, and beg the hackers to make it stop.

Wireless Carjackers

This wasn’t the first time Miller and Valasek had put me behind the wheel of a compromised car. In the summer of 2013, I drove a Ford Escape and a Toyota Prius around a South Bend, Indiana, parking lot while they sat in the backseat with their laptops, cackling as they disabled my brakes, honked the horn, jerked the seat belt, and commandeered the steering wheel. “When you lose faith that a car will do what you tell it to do,” Miller observed at the time, “it really changes your whole view of how the thing works.” Back then, however, their hacks had a comforting limitation: The attacker’s PC had been wired into the vehicles’ onboard diagnostic port, a feature that normally gives repair technicians access to information about the car’s electronically controlled systems.

A mere two years later, that carjacking has gone wireless. Miller and Valasek plan to publish a portion of their exploit on the Internet, timed to a talk they’re giving at the Black Hat security conference in Las Vegas next month. It’s the latest in a series of revelations from the two hackers that have spooked the automotive industry and even helped to inspire legislation; WIRED has learned that senators Ed Markey and Richard Blumenthal plan to introduce an automotive security bill today to set new digital security standards for cars and trucks, first sparked when Markey took note of Miller and Valasek’s work in 2013.

(more…)

Computer Hacking Liability – Are You At Risk?

Wednesday, December 19th, 2012

Presented by McNair Law Firm, P.A.

Please join us for the
InnoVision Forum:

Computer Hacking Liability – Are You At Risk?
What To Do To Avoid Data Breaches and Hacking and
What To Do If You are Hacked

From the US Government to the State of South Carolina, companies and organizations of all sizes are under attack from hackers. The threat of these attacks has escalated so that cyber security professionals admit it is almost impossible to achieve 100% prevention.  According to Verizon’s 2011 report, small and medium sized businesses, as well as governments and municipalities, are the main targets.  Please join us to discuss the legal liability associated with hacking for you and your company, leading edge prevention measures to avoid hacking, and what your obligations are in the event that a breach is suspected or discovered.  We will also discuss the role of the financial institution in these circumstances.

PANEL INCLUDES:

Douglas W. Kim
Attorney
McNair Law Firm, P.A.

 

  • Doug will discuss the current laws concerning security requirements including the Red Flag Rules, PCI Compliance, South Carolina specific laws and recent cases involving hacking.  His discussion will include the recent case where a bank was required to repay monies lost to a customer due to hackers ($345,000.00).

Frank Mobley
Founder and CEO
Immedion, LLC

 

  • Frank will discuss current IT security risks and the prevalence and method of hacking.  He will also include information on how you can better protect your organization against illicit and illegal attempts to garner private information.

Deveren Werne
Founder of Mojoe.net and
Principal of Liquid Video Technologies, Inc.

 

  • Deveren will explain PCI compliance for businesses such as why a business should be PCI compliant and, if not, what are the repercussions of not being compliant, and what a business should do to become compliant from hardware to software perspective.

Wednesday, January 9, 2013
3:00 pm – 5:00 pm Presentations ~ 5:00 pm – 7:00 pm Networking
Location – McNair Law Firm, P.A., Poinsett Plaza, Suite 700, 104 S. Main Street, Greenville, SC

Seating is limited, so please respond early

RSVP to Kathy Ham by email: kham@mcnair.net or by phone: (864) 552-9345

Founding Sponsor:
Deloitte Founding Sponsor of InnoVision Awards

www.innovisionawards.org

Celebrating excellence. Honoring distinction. Applauding innovation.

Web Design Greenville SC | Mojoe Blog is proudly powered by WordPress | Entries (RSS) and Comments (RSS).

Follow

Get every new post delivered to your Inbox

Join other followers:

Toms Sko
toms sko nettbutikk
toms sko norge
toms sko salg
Toms
Billige Toms Sko Dame
Billige Toms Sko
colorful toms
toms shoes classics
toms shoes for men
toms shoes men
tom sko
toms mens shoes
canvas toms
toms stripes
tom's shoes men
toms pics
jordans for sale
Toms Sko
toms sko nettbutikk
toms sko norge
toms sko salg
Toms Sko
toms sko nettbutikk
toms sko norge
toms sko salg
Toms Sko
toms sko nettbutikk
toms sko norge
toms sko salg
Toms Sko
toms sko nettbutikk
toms sko norge
toms sko salg
Toms Sko
toms sko nettbutikk
toms sko norge
toms sko salg
Toms Sko
toms sko nettbutikk
toms sko norge
toms sko salg
jordans for sale
cheap jordans
buy authentic cheap
jordans for sale
Jordan 7 Bordeaux
Jordan 6 Low Infrared 23
Jordan 13 Low Bred
Jordan 11 Low Bred
Jordan retro shoes store
buy jordans shoes
jordan shoes for sale
jordan store
authentic jordans
Air Jordan retro shoes
Toms Sko
Toms Sko
colorful toms
colorful toms shoes
Toms Sko
toms shoes classics
toms shoes classics
toms classics
toms classics
Toms Sko
Toms Sko
Toms Sko
toms Sko for salg
toms Sko billig
toms Sko for salg
Toms Sko
Buy TOMS Shoes Online
Buy TOMS Shoes
Buy TOMS
Classics TOMS
toms shoes
toms sale
toms outlet
cheap toms shoes
toms children
women toms
toms men
toms shoes 2015
toms sale stores
toms shoes
toms one shoes
Toms Sale
Buy TOMS Shoes Online
Buy TOMS Shoes
Buy TOMS
TOMS
Classics TOMS
toms shoe
toms sale
toms outlet
cheap toms shoes
toms children
women toms
toms men
toms shoes 2015
toms shoes sale
toms shoes shop
toms sko
toms sko uttak
toms sko
toms sko billig