How To Protect Your Car From Hackers

The FBI issued a PSA this week warning us of how hackers can take control of our cars. Its time for a software upgrade.

This week the FBI warned that consumers and manufacturers should remain vigilant to computer attacks targeted at automobiles. In a joint press release with the Department of Transportation and the National Highway Traffic Safety Administration (NHTSA), the FBI cautioned that motor vehicles are increasingly vulnerable to remote exploits, allowing hackers to sever the brakes and control the steering. As unsuccessful as we’ve been in the ongoing struggle with malicious hackers over control of our mobile phones and bank accounts, I can only imagine where this will lead. 


“The FBI and NHTSA are warning the general public and manufacturers – of vehicles, vehicle components, and aftermarket devices – to maintain awareness of potential issues and cybersecurity threats related to connected vehicle technologies in modern vehicles,” the agencies released in a statement Thursday. “With this increased connectivity, it is important that consumers and manufacturers maintain awareness of potential cyber security threats.”

Back in the summer of last year, two security researchers—Charlie Miler and Chris Valasek—remotely hijacked a Jeep Cherokee. Through software vulnerabilities in the code powering the vehicle, Miller and Valasek sent commands to car that gave them control over the entertainment system, the steering and braking systems, the climate system, and other software-controlled functions within the vehicle. “When you lose faith that a car will do what you tell it to do,” Miller said in an interview at the time, “it really changes your whole view of how the thing works.”

According to the FBI, using a cellular signal or the user-enabled WiFi within the vehicle, Miller and Valasek were able to manipulate:

  • In a target vehicle, at low speeds (5-10 mph):
  • Engine shutdown
  • Disable brakes
  • Steering
  • In a target vehicle, at any speed:
  • Door locks
  • Turn signal
  • Tachometer
  • Radio, HVAC, GPS
  • After Miller and Valasek identified the vulnerabilities within the Jeep Cherokee, Chrysler issued a 1.4 million vehicle recall and mailed USB drives to owners with updated software to fix the exploits.

    Most vehicles today run software. Many of them now possess Wifi within the vehicle or allow some wireless connectivity to the car via cellular signal. Over 30 GM models in the Chevy, Cadillac, Buick, and GMC lines come optionally equipped with 4G LTE. “We’re excited to give millions of customers an opportunity to explore the technology,” said Mary Chan, president of GM’s OnStar subsidiary operating the maker’s 4G service.

    It’s evident that as more cars are connected to the outside world (and the Internet), we can expect more problems. So what are we supposed to do?

    If your car has Wifi connectivity, the FBI recommends:

  • Ensure your vehicle software is up to date. If you are unsure if it is, call your vehicle manufacturer and ask how to determine the software version you have and if it’s the most recent. If it isn’t, take your car to the dealer and have them upgradte it.
  • Be careful when making modifications to the vehicle software. If you modify the software on your own, you may open up additional vulnerabilities.
  • Maintain awareness and exercise discretion when connecting third-party devices to your vehicle. This includes USB drives, iPods, mobile phones, etc. If you can plug it into your car or connect to it via Bluetooth, you are creating a vector for attack.
  • Be aware of who has physical access to your vehicle. They may install software without your knowledge, giving them remote control to systems within your car.
  • LinkedIn meets Tinder in this mindful networking app

    Swipe right to make the connections that could change your career.

    Getty Images
    Sponsored
    Swipe right. Match. Meet over coffee or set up a call.

    No, we aren't talking about Tinder. Introducing Shapr, a free app that helps people with synergistic professional goals and skill sets easily meet and collaborate.

    Keep reading Show less

    What’s behind our appetite for self-destruction?

    Is it "perverseness," the "death drive," or something else?

    Photo by Brad Neathery on Unsplash
    Mind & Brain

    Each new year, people vow to put an end to self-destructive habits like smoking, overeating or overspending.

    Keep reading Show less

    Physicists puzzled by strange numbers that could explain reality

    Eight-dimensional octonions may hold the clues to solve fundamental mysteries.

    Surprising Science
    • Physicists discover complex numbers called octonions that work in 8 dimensions.
    • The numbers have been found linked to fundamental forces of reality.
    • Understanding octonions can lead to a new model of physics.
    Keep reading Show less

    Douglas Rushkoff – It’s not the technology’s fault

    It's up to us humans to re-humanize our world. An economy that prioritizes growth and profits over humanity has led to digital platforms that "strip the topsoil" of human behavior, whole industries, and the planet, giving less and less back. And only we can save us.

    Think Again Podcasts
    • It's an all-hands-on-deck moment in the arc of civilization.
    • Everyone has a choice: Do you want to try to earn enough money to insulate yourself from the world you're creating— or do you want to make the world a place you don't have to insulate yourself from?
    Keep reading Show less