The Industry's #1 Resource




Teslas Response to Hacked Car Offers a Road Map for Fast Fixes

IT Business Net -- Cybersecurity researchers on Friday are publicizing software flaws in the Tesla Model S that could allow remote hackers to shut down a moving cars engine.

But owners of the high-tech luxury sedan had little need to worry. The electric-car maker quickly deployed a fix over the Internet

As cars loaded with on-board computers increasingly add wireless connections they are becoming more vulnerable to hackers, as seen recently with a Jeep Cherokee. Teslas response offers a model for how other automakers can address the increasing threat of computer attacks. Tesla owners get prompted on their cars infotainment screens to download software updates, the same way smartphone users do.

The consultants who found the Model S flaws -- Kevin Mahaffey, co-founder and chief technology officer of Lookout Inc., and Marc Rogers, principal security researcher for CloudFlare Inc. -- revealed the vulnerabilities earlier this week ahead of a presentation Friday at the DefCon hacker conference in Las Vegas. The pair discovered six key weaknesses in the vehicle, alerted Tesla Motors Inc. and coordinated their disclosure with a fix from the automaker to reduce the risk to owners of the car, which starts at $70,000.

Two-Edged Sword

Such responsible disclosure, as the process is known in the cybersecurity community, is common in the computer industry. Tesla is unusual in the automotive industry for its ability to update owners vehicles quickly over the Internet. That ability cuts both ways, however; if an automaker can gain access to vehicle electronics from afar, so, too, could a malicious hacker.

Fiat Chrysler Automobiles NV was told to recall about 1.4 million vehicles last month to update software after researchers remotely hacked a Jeep Cherokee traveling at 70 miles per hour and caused it to run off a freeway in a demonstration for Wired. The automaker patched its software by mailing out USB drives to be plugged into vehicles.

That hack, which worked by scanning a cellular network to locate and disable Jeeps, showed that wireless connections are the weak underbelly of high-tech cars. Such attacks are potentially more dangerous than the method in the Tesla hack, in which the researchers had to have physical access to tamper with the cars electronics.

Read the rest of the story here: http://www.itbusinessnet.com/article/Teslas-Response-to-Hacked-Car-Offers-a-Road-Map-for-Fast-Fixes-4014519



Copyright - Mobile Electronics Association 2020