Hackers Might Help Defending Tesla High-Tech Cars
Since our cars become smarter, their doors have become open to more hacking dangers. At the DEF CON digital security conference, security researchers Marc Rogers and Kevin Mahaffey explained how they hacked a Tesla Model S.
Since modern cars have computers if you crash the computer you can also crash the vehicle. The two hackers tried doing exactly that with a car that in their opinion is strong in terms of hardware and software. For their experiment, Rogers and Mahaffey chose the Tesla Model S and were successful booking in. This is of no surprise, but what's really surprising is the way Tesla responded.
Marc Rogers is a principal security researcher with CloudFlare and Kevin Mahaffey is a co-founder of Lookout. Their cyber-security firms are based in San Francisco, California. The two security researchers came to attend DEF CON in Las Vegas, a popular conference among hacker and security experts. DEF CON is the place to exchange tricks of the trade, being attended by both "black hats" and "white hats". Rogers and Mahaffey are "white hats", security experts who break into networks only to research flaws and help getting them fixed.
According to Rogers, they could break in the Tesla Model 5 because the cars feature a cable inside, used by the maintenance technicians to access the on-board system and fix things. The cable is supposedly hidden in a secret panel, either under the touch screen or at the left of the driver. But for the two security experts was easy to find the cable and connect. According to Rogers, this gives you access to look for security flaws in the software.
The team was able to find several security weaknesses of the software installed on Tesla Model S. This way, they gained access to the car's network and made the computers on the network to leak information, according to Rogers. He and Mahaffey were able to convince computers at Tesla headquarters to communicate with their laptop as it would be the car's onboard computer.
At this point the two were able to request permission for more information from Tesla servers, Rogers explained. By analyzing the information received from Tesla's networks the hackers were able to get administrative access to the car and to take over all the car's computers. At that point, the team built a back door to enable control from afar. They could bring later a real-life Model S to a halt by using that back door.
However, Tesla's customers don't have to worry. Tesla, unlike other automakers, has a system in place to fix security flaws through regular software updates. According to Tesla co-founder and chief technology officer, JB Straubel, the company does over-the-air updates every three months in the same way Apple, for instance, does for iPhones. And since the two hackers emailed Tesla about the security flaw they found.
Straubel and his team invited Rogers and Mahaffey for a meeting to get details. The company has also had a security bug bounty program in place that offers rewards to researchers who point out flaws in its vehicle information systems. The maximum reward was recently upped to $10,000.
Faraday Future To Build 10,000 Cars Per Year In New Hanford Factory
Faraday Future has leased a former tire plant in Hanford, California.
Elon Musk Reveals First Images Of Tesla Model 3 Production Unit On Twitter
Elon Musk showed off the very first Tesla Model 3 unit on Twitter and Instagram.
Tesla Model S Leaves Showboating Porsche Cayman GT4 Spinning
A new viral video shows a Porsche Cayman GT4 spinning out of control as it was embarrassingly left behind by a Tesla Model S P90D.
Tesla Model S Is 'The Fastest Production Car' On Earth
A Belgian team drove a P100D on a 26km loop, showing that the fastest Tesla with a 2.5-second 0-60 time is also the one with the most range and have set a new “hypermiling” record for the Tesla Model S.
Tesla Model 3 Reveals New Features, Some Rumors Confirmed
Tesla recently revealed that the Model 3 will have three new features while also confirming a couple of rumored ones.
MORE IN ITECHPOST
Beyond Queen's Stomp-Stomp-Clap: Concerts and Computer Science Converge in New Research
The iconic "stomp-stomp-clap" of Queen's "We Will Rock You" was born out of the challenge that rock stars and professors alike know all too well: How to get large numbers of people engaged in participating during a live performance like a concert -- or a lecture -- and channel that energy for a sustained time period.
Using Waves to Move Droplets
Self-cleaning surfaces and laboratories on a chip become even more efficient if we are able to control individual droplets. University of Groningen professor Patrick Onck, together with colleagues from the Eindhoven University of Technology, has shown that this is possible by using a technique named mechanowetting.