Hackers Might Help Defending Tesla High-Tech Cars
Since our cars become smarter, their doors have become open to more hacking dangers. At the DEF CON digital security conference, security researchers Marc Rogers and Kevin Mahaffey explained how they hacked a Tesla Model S.
Since modern cars have computers if you crash the computer you can also crash the vehicle. The two hackers tried doing exactly that with a car that in their opinion is strong in terms of hardware and software. For their experiment, Rogers and Mahaffey chose the Tesla Model S and were successful booking in. This is of no surprise, but what's really surprising is the way Tesla responded.
Marc Rogers is a principal security researcher with CloudFlare and Kevin Mahaffey is a co-founder of Lookout. Their cyber-security firms are based in San Francisco, California. The two security researchers came to attend DEF CON in Las Vegas, a popular conference among hacker and security experts. DEF CON is the place to exchange tricks of the trade, being attended by both "black hats" and "white hats". Rogers and Mahaffey are "white hats", security experts who break into networks only to research flaws and help getting them fixed.
According to Rogers, they could break in the Tesla Model 5 because the cars feature a cable inside, used by the maintenance technicians to access the on-board system and fix things. The cable is supposedly hidden in a secret panel, either under the touch screen or at the left of the driver. But for the two security experts was easy to find the cable and connect. According to Rogers, this gives you access to look for security flaws in the software.
The team was able to find several security weaknesses of the software installed on Tesla Model S. This way, they gained access to the car's network and made the computers on the network to leak information, according to Rogers. He and Mahaffey were able to convince computers at Tesla headquarters to communicate with their laptop as it would be the car's onboard computer.
At this point the two were able to request permission for more information from Tesla servers, Rogers explained. By analyzing the information received from Tesla's networks the hackers were able to get administrative access to the car and to take over all the car's computers. At that point, the team built a back door to enable control from afar. They could bring later a real-life Model S to a halt by using that back door.
However, Tesla's customers don't have to worry. Tesla, unlike other automakers, has a system in place to fix security flaws through regular software updates. According to Tesla co-founder and chief technology officer, JB Straubel, the company does over-the-air updates every three months in the same way Apple, for instance, does for iPhones. And since the two hackers emailed Tesla about the security flaw they found.
Straubel and his team invited Rogers and Mahaffey for a meeting to get details. The company has also had a security bug bounty program in place that offers rewards to researchers who point out flaws in its vehicle information systems. The maximum reward was recently upped to $10,000.
Faraday Future To Build 10,000 Cars Per Year In New Hanford Factory
Faraday Future has leased a former tire plant in Hanford, California.
Elon Musk Reveals First Images Of Tesla Model 3 Production Unit On Twitter
Elon Musk showed off the very first Tesla Model 3 unit on Twitter and Instagram.
Tesla Model S Leaves Showboating Porsche Cayman GT4 Spinning
A new viral video shows a Porsche Cayman GT4 spinning out of control as it was embarrassingly left behind by a Tesla Model S P90D.
Tesla Model S Is 'The Fastest Production Car' On Earth
A Belgian team drove a P100D on a 26km loop, showing that the fastest Tesla with a 2.5-second 0-60 time is also the one with the most range and have set a new “hypermiling” record for the Tesla Model S.
Tesla Model 3 Reveals New Features, Some Rumors Confirmed
Tesla recently revealed that the Model 3 will have three new features while also confirming a couple of rumored ones.
MORE IN ITECHPOST
These Are 5 of the Most Wanted IT Jobs in 2020
These are the most wanted IT jobs in 2020, considering different factors such as: education, salary and job outlook.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Game Developers’ Different Roles in the Studio
Learn about the different professionals involved in developing video games. Becoming a game developer is one of the coolest jobs around and your 14-year-old self, perched on the edge of your bed as you play PlayStation, will thank you for making such an awesome career move.
Michael Wiener of Albuquerque New Mexico Shares Fun Facts About the History of USA License Plates
Motor vehicle license plates are physical, historical records of motor vehicle history and license plate collecting attracts fans of history, motor vehicles, and classic design. In this article, license plate expert Michael Wiener of Albuquerque New Mexico shares fun facts about license plates in the United States.