Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      South Africa loosens media ownership rules – but keeps one hand on the remote

      16 July 2025

      Eskom targets 32GW green energy shift by 2040

      16 July 2025

      MTN Group appoints new chief enterprise officer

      16 July 2025

      Kruger Park’s white rhinos get a hi-tech lifeline

      16 July 2025

      The real cost of a cashless economy

      16 July 2025
    • World

      Grok 4 arrives with bold claims and fresh controversy

      10 July 2025

      Samsung’s bet on folding phones faces major test

      10 July 2025

      Bitcoin pushes higher into record territory

      10 July 2025

      OpenAI to launch web browser in direct challenge to Google Chrome

      10 July 2025

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025
    • In-depth

      The 1940s visionary who imagined the Information Age

      14 July 2025

      MultiChoice is working on a wholesale overhaul of DStv

      10 July 2025

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025
    • TCS

      TCS+ | Samsung unveils significant new safety feature for Galaxy A-series phones

      16 July 2025

      TCS+ | MVNX on the opportunities in South Africa’s booming MVNO market

      11 July 2025

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025
    • Opinion

      A smarter approach to digital transformation in ICT distribution

      15 July 2025

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » News » Watch how hackers can take control of a Jeep

    Watch how hackers can take control of a Jeep

    By Agency Staff22 July 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Smart technologies in modern cars could make them vulnerable to hackers, a video purports to show.

    In a YouTube posting by Wired, a standard 2014 Jeep is hacked by a pair who compromise the cellular connectivity of the vehicle.

    “It hasn’t been altered in any way; there are no devices attached to it, but like many thousands of Jeeps, it can be remotely hacked over the Internet,” says Wired senior writer Andy Greenberg in the video.

    The hackers, Charlie Miller and Chris Valasek, appear to have no direct connection to the vehicle except the mobile network. In the demonstration they are able to show they can take control of the sound system, air conditioning, brakes and even steering.

    Greenberg experiences some anxiety in the video when Miller and Valasek show that they are able to shut down the engine while he is driving on the highway with no immediate area to pull off.

    The issue of security on smart cars could have serious repercussions for manufacturers in South Africa.

    While the concept of fault under South African law has to be established for civil claims such as an accident, the legal framework will have some difficulty with smart technology.

    “In the scenario of a hacker causing a driver’s brakes to fail, that driver would have to show that he was not at fault. In other words, the accident could not be attributed to him because part of the car (the brakes) failed to work due to an outside influence (hackers), which was beyond his control,” specialist technology attorney Russel Luck said.

    However, the driver has to prove that a crash was the result of a hack, Luck added.

    “The challenge for the driver would be to prove interference by the hacker which caused the brakes to fail. This becomes a question of fact whether the driver is able to prove in a court of law that their brakes were tampered with by a third party.”

    For a smart car manufacturer, the law throws up issues of liability if it can be shown that a security system was inadequate.

    “For example, if a security system relied on password protected keypads, but the software on those keypads was defective causing any number combination to be recognised as the password, the manufacturer would be liable for recourse,” said Luck.  — Fin24



    Andy Greenberg Charlie Miller Chris Valasek Jeep Russel Luck Wired
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleVox buys Frogfoot in fibre play
    Next Article Are libraries still relevant?

    Related Posts

    Stellantis is keen to build electric cars in South Africa

    7 June 2024

    Electric cars pass a crucial tipping point in 23 countries

    28 August 2023

    No, BMW, we should not have to pay extra to heat our seats

    15 July 2022
    Company News

    Ransomware in South Africa: the human factor behind the growing crisis

    16 July 2025

    Mental wellness at scale: how Mac fuels October Health’s mission

    15 July 2025

    Banking on LEO: Q-KON transforms financial services connectivity

    14 July 2025
    Opinion

    A smarter approach to digital transformation in ICT distribution

    15 July 2025

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.