Quantcast

Remote Exploitation of an Unaltered Passenger Vehicle 5: Sending CAN Messages

Charlie and Chris venture to reach a new level of vehicle compromise by exploiting the V850 microcontroller’s firmware to remotely issue arbitrary commands. Charlie Miller: So far in this story, we could only play...

Best Security Software 2016 – Privacy PC Awards

Security suites are bound to meet the ever-evolving challenges of cybercrime otherwise they simply lose topicality. The gauntlet thrown down by malicious software has come to pose a much more serious risk than a year...

Remote Exploitation of an Unaltered Passenger Vehicle 4: Attacks Over Cellular Network

Having described a proof of concept regarding vehicle attacks over Wi-Fi, Charlie Miller and Chris Valasek move on to the cellular exploitation scenario. Charlie Miller: So, well, let’s see if we can do this over the...

Remote Exploitation of an Unaltered Passenger Vehicle 3: Uconnect Payloads

Charlie and Chris demonstrate what can be remotely done to a modern vehicle’s HVAC and infotainment system through deploying payloads on the head unit. Charlie Miller: So, we used a protocol called Dfeet, which...

Remove TeslaCrypt ransomware and recover encrypted .vvv/.ccc files

Neither TeslaCrypt nor its copycat AlphaCrypt ransomware is new on the cybercrime arena. In fact, this infection first surfaced in early spring 2015, and it has undergone eight updates over the course of the year. The...

Remote Exploitation of an Unaltered Passenger Vehicle 2: Connecting to the WPA2 Network

The researchers touch upon jailbreaking the Uconnect and shift the focus to attacking the Jeep’s head unit over Wi-Fi, in particular the hurdles along the way. Chris Valasek: Real quick – jailbreak (see right-hand...

Reason Core Security review

$24.95 Reason Core Security is all about simplicity combined with solid protection against malware. Usability:  Features:  Efficiency:  Support:  Overall:  Download For a security...

Remote Exploitation of an Unaltered Passenger Vehicle

Twitter’s Charlie Miller and IOActive’s Chris Valasek present their research on the buzz topic of remotely hacking into the controls of the modern vehicles. Chris Valasek: I don’t know if we need introductions...
Recent from News
Recent from How to ...