Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
New hacks strike at heart of mobile innovations
By Glenn CHAPMAN
Las Vegas (AFP) Aug 7, 2015


Tesla courts hackers to defend high-tech cars
Las Vegas (AFP) Aug 9, 2015 - Hackers swarmed a Tesla sedan in a 'hacking village' at the infamous Def Con conference on Saturday as the high-tech electric car maker recruited talent to protect against cyber attacks.

It was the second year in a row the California-based company was at the world's largest gathering of hackers in Las Vegas, and came on the heels of a massive recall of Fiat Chrysler Automobiles vehicles to patch a flaw that could let them be remotely commandeered.

"Hackers are a crowd that is really important to us," Tesla's Khobi Brooklyn told AFP while Def Con attendees took turns inside a black Model S sedan parked inside a casino convention area.

"It is a community that we want to be part of, and collaborate with, as well as recruit from."

Tesla recruiters were on hand, along with members of the California-based company's security team.

Tesla cars are highly computerized. New features as well as software updates are pushed out to vehicles over wireless Internet connections.

"They are not messing with our software," Brooklyn said with only a hint of hesitation.

She knew of no cyber attacks aimed at Tesla cars, at Def Con or anywhere else.

Tesla has worked with Lookout Mobile Security to find and patch software vulnerabilities in sedans, according to Brooklyn.

- Data centers on wheels -

Lookout co-founder and chief technology officer Kevin Mahaffey and Marc Rogers of CloudFlare online security firm took part in a Def Con presentation on Tesla software defense flaws that were discovered and then shared with the company.

They referred to Tesla sedans as data centers on wheels, and urged great care when trying to hack vehicles that could be racing along at 100 mph (160 km) or so.

"As cars become more connected, we need to think about them a lot more like smartphones where you are constantly testing and improving products to make they as secure as you can," Brooklyn said.

Fiat Chrysler Automobiles issued a safety recall for 1.4 million US cars and trucks last month after hackers demonstrated that they could remotely control their systems while they are in operation.

The recall came after cybersecurity experts Charlie Miller and Chris Valasek remotely commandeered a Jeep Cherokee, made by Chrysler, to demonstrate the vulnerability of the vehicles' electronic systems.

Miller and Valasek presented details of the hack at a Def Con session on Saturday.

The recall involves a broad range of Dodge, Jeep, Ram and Chrysler cars and trucks produced between 2013 and 2015 that have radios vulnerable to hacking.

As fierce competition leads to rapid innovation in the smartphone market, hackers have pounced on cracks in defenses of developments on devices at the heart of modern lifestyles, experts say.

Smartphones have become increasingly targets for cyber criminals as people cram the gadgets with troves of personal information and go on to use them for work.

"Mobile devices are taking a bigger place in businesses and in our lives," Avi Bashan of Tel Aviv based cyber defense firm Check Point Software Technologies told AFP on Thursday at a Black Hat computer security conference in Las Vegas.

"As more people use them for more things, attackers gain interest."

Check Point has seen attacks rise during the past three years on the world's leading mobile operating systems - Apple iOS and Google-backed Android, according to Bashan.

Check Point researchers at Black Hat revealed a vulnerability that allows hackers take over Android smartphones by taking advantage of a tool pre-installed that was intended to give tech support workers remote access to devices.

"It effects every version of Android," Check Point mobile threat prevention director Ohad Bobrov said.

The hack can be triggered by tricking a smartphone user into installing an application rigged to reach out and connect with the pre-installed support tool, Bobrov explained.

In some cases the hack can be accomplished by sending a text message that a recipient doesn't even have to open, he warned.

The text message tricks a smartphone into thinking it is connecting with a legitimate support technician remotely when it is actually linking to an online server commanded by a hacker.

"I need your phone number and that is it," Bashan told AFP.

Bobrov said the flaw in Android software architecture has been disclosed to Google and smartphone makers.

- Dealing with Stagefright -

The Check Point revelation came a week after cyber security firm Zimperium warned of a "Stagefright" vulnerability in the world's most popular smartphone operating system that also lets hackers take control with a text message.

Zimperium research senior director Joshua Drake took a stage at Black Hat to discuss Android code at the heart of the problem.

Stagefright automatically pre-loads video snippets attached to text messages to spare recipients from the annoyance of waiting to view clips.

Hackers can hide malicious code in video files and it will be unleashed even if the smartphone user never opens it or reads the message, according to Drake.

Stagefright imperils some 95 percent, or an estimated 950 million, of Android phones, according to the security firm.

Zimperium reported the problem to Google and provided the California Internet firm with patches to prevent breaches. Updates have started hitting Android devices, according to Drake.

Computer security firm Secunia on Thursday said about 80 vulnerabilities were discovered in Apple mobile operating software so far this year and about 10 were found in Android.

"There has been a big boom in mobile," Drake said.

"When there is a big boom, people take a lot of shortcuts, when you take shortcuts you build up a lot of technical debt."

Mobile operating system makers who raced ahead now have to backtrack to squash bugs, some of which are exposed by good-guy hackers.

Check Point's Bashan sees it as a case of smartphone rivals moving so fast to add features and improvements that innovation trumped security at times in the process.

"The operating systems developed so quickly," Bashan said.

"And when you develop quickly, some things get developed badly."


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
US bill requiring carriers to report 'terror' criticized
Washington (AFP) Aug 4, 2015
A coalition including civil liberties and human rights activists urged US lawmakers Tuesday to reject a bill that would require Internet companies to report signs of "terrorist activity" on their networks. More than 30 organizations endorsed an open letter urging the Senate to reject the measure included in an intelligence authorization act which cleared a committee and had been on track for ... read more


CYBER WARS
NASA Could Return Humans to the Moon by 2021

Smithsonian embraces crowdfunding to preserve lunar spacesuit

NASA Sets Sights on Robot-Built Moon Colony

Technique may reveal the age of moon rocks during spaceflight

CYBER WARS
Buckingham astrobiologists to look for life on Mars

NASA Mars Orbiter Preparing for Mars Lander's 2016 Arrival

New Website Gathering Public Input on NASA Mars Images

Antarctic Offers Insights Into Life on Mars

CYBER WARS
Third spaceflight for astronaut Paolo Nespoli

New rocket could one day launch flight to Europa

ISU Educates Future Space Leaders

Domes Arrive for CST-100 Test Article Assembly

CYBER WARS
Chinese earth station is for exclusively scientific and civilian purposes

Cooperation in satellite technology put Belgium, China to forefront

China set to bolster space, polar security

China's super "eye" to speed up space rendezvous

CYBER WARS
Space Kombucha in the search for life and its origin

Political Tensions Have No Impact on Space Cooperation- Roscosmos

RED epic dragon camera captures riveting images on space station

Launch, docking returns ISS crew to full strength

CYBER WARS
Payload fit-check for next Ariane 5 mission

SMC goes "2-for-2" on weather delayed launch

China tests new carrier rocket

Arianespace inaugurates new fueling facility for Soyuz upper stage

CYBER WARS
Microlensing used to find distant Uranus-sized planet

NASA's Spitzer Confirms Closest Rocky Exoplanet

Finding Another Earth

Kepler Mission Discovers Bigger, Older Cousin to Earth

CYBER WARS
Photoaging could reverse negative impact of ultraviolet radiation

New device converts DC electric field to terahertz radiation

A droplet's pancake bounce

Cooking up altered states




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.