TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentralTechCentral
    NEWSLETTER
    • News

      Icasa moves to license more broadband spectrum

      17 August 2022

      Eskom to impose more load shedding

      17 August 2022

      Tiger Brands to go solar – to start with four manufacturing plants

      17 August 2022

      Google buys into African e-logistics firm Lori Systems

      17 August 2022

      A new normal is dividing the global chip industry

      17 August 2022
    • World

      Tencent reports first-ever sales decline

      17 August 2022

      Chip makers are flashing a big warning for the global economy

      17 August 2022

      Semiconductor boom turns to bust

      16 August 2022

      Tencent plans to offload R400-billion Meituan stake: sources

      16 August 2022

      Ether leaps higher on verge of Merge

      16 August 2022
    • In-depth

      African unicorn Flutterwave battles fires on multiple fronts

      11 August 2022

      The length of Earth’s days has been increasing – and no one knows why

      7 August 2022

      As Facebook fades, the Mad Men of advertising stage a comeback

      2 August 2022

      Crypto breaks the rules. That’s the point

      27 July 2022

      E-mail scams are getting chillingly personal

      17 July 2022
    • Podcasts

      Qush on infosec: why prevention is always better than cure

      11 August 2022

      e4’s Adri Führi on encouraging more women into tech careers

      10 August 2022

      How South Africa can woo more women into tech

      4 August 2022

      Book and check-in via WhatsApp? FlySafair is on it

      28 July 2022

      Interview: Why Dell’s next-gen PowerEdge servers change the game

      28 July 2022
    • Opinion

      No reason South Africa should have a shortage of electricity: Ramaphosa

      11 July 2022

      Ntshavheni’s bias against the private sector

      8 July 2022

      South Africa can no longer rely on Eskom alone

      4 July 2022

      Has South Africa’s advertising industry lost its way?

      21 June 2022

      Rob Lith: What Icasa’s spectrum auction means for SA companies

      13 June 2022
    • Company Hubs
      • 1-grid
      • Africa Data Centres
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»News»Watch how hackers can take control of a Jeep

    Watch how hackers can take control of a Jeep

    News By Agency Staff22 July 2015
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Smart technologies in modern cars could make them vulnerable to hackers, a video purports to show.

    In a YouTube posting by Wired, a standard 2014 Jeep is hacked by a pair who compromise the cellular connectivity of the vehicle.

    “It hasn’t been altered in any way; there are no devices attached to it, but like many thousands of Jeeps, it can be remotely hacked over the Internet,” says Wired senior writer Andy Greenberg in the video.

    The hackers, Charlie Miller and Chris Valasek, appear to have no direct connection to the vehicle except the mobile network. In the demonstration they are able to show they can take control of the sound system, air conditioning, brakes and even steering.

    Greenberg experiences some anxiety in the video when Miller and Valasek show that they are able to shut down the engine while he is driving on the highway with no immediate area to pull off.

    The issue of security on smart cars could have serious repercussions for manufacturers in South Africa.

    While the concept of fault under South African law has to be established for civil claims such as an accident, the legal framework will have some difficulty with smart technology.

    “In the scenario of a hacker causing a driver’s brakes to fail, that driver would have to show that he was not at fault. In other words, the accident could not be attributed to him because part of the car (the brakes) failed to work due to an outside influence (hackers), which was beyond his control,” specialist technology attorney Russel Luck said.

    However, the driver has to prove that a crash was the result of a hack, Luck added.

    “The challenge for the driver would be to prove interference by the hacker which caused the brakes to fail. This becomes a question of fact whether the driver is able to prove in a court of law that their brakes were tampered with by a third party.”

    For a smart car manufacturer, the law throws up issues of liability if it can be shown that a security system was inadequate.

    “For example, if a security system relied on password protected keypads, but the software on those keypads was defective causing any number combination to be recognised as the password, the manufacturer would be liable for recourse,” said Luck.  — Fin24

    Andy Greenberg Charlie Miller Chris Valasek Jeep Russel Luck Wired
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleVox buys Frogfoot in fibre play
    Next Article Are libraries still relevant?

    Related Posts

    Icasa moves to license more broadband spectrum

    17 August 2022

    Eskom to impose more load shedding

    17 August 2022

    Tiger Brands to go solar – to start with four manufacturing plants

    17 August 2022
    Add A Comment

    Comments are closed.

    Promoted

    Top cybersecurity challenge is inadequate identification of key risks

    17 August 2022

    Acrobat Sign and Microsoft accelerate digital transformation

    17 August 2022

    HPE SimpliVity: addressing SMBs’ data conundrums

    16 August 2022
    Opinion

    No reason South Africa should have a shortage of electricity: Ramaphosa

    11 July 2022

    Ntshavheni’s bias against the private sector

    8 July 2022

    South Africa can no longer rely on Eskom alone

    4 July 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.