[cs_content][cs_section parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_angle_point=”50″ style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][cs_text]
Stealing Jeeps — using laptops
[/cs_text][cs_block_grid type=”two-up”][cs_block_grid_item title=”Block Grid Item 1″]Texas police have charged two men believed to be responsible for the theft and illegal export of more than 100 vehicles — using laptop computers.. [/cs_block_grid_item][cs_block_grid_item title=”Block Grid Item 2″]Law Enforcement said that the two suspects specifically targeted Jeep and Dodge vehicles in the Houston area. They used the laptops to tap into the vehicles’ systems to start them without a key.[/cs_block_grid_item][/cs_block_grid][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_angle_point=”50″ style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][cs_text]
Hacking a Cherokee and a Leaf
[/cs_text][cs_block_grid type=”two-up”][cs_block_grid_item title=”Block Grid Item 1″]Hackers Charlie Miller and Chris Valasek wirelessly hacked into a Jeep Cherokee and demonstrated how they managed to take control of the vehicle’s entertainment system, air conditioning, steering, and brakes—all with someone in the car.[/cs_block_grid_item][cs_block_grid_item title=”Block Grid Item 2″]The Nissan Leaf is the story of car connectivity outpacing security. A flaw in the companion app was easily exploited, which allowed hackers to access the car. The hacker only needed the car’s Vehicle Identity Number to take control—a number which is printed on the windows of all the cars.[/cs_block_grid_item][/cs_block_grid][/cs_column][/cs_row][/cs_section][cs_section parallax=”false” separator_top_type=”none” separator_top_height=”50px” separator_top_angle_point=”50″ separator_bottom_type=”none” separator_bottom_height=”50px” separator_bottom_angle_point=”50″ style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][cs_text]
Automakers are aware of the problem
[/cs_text][cs_block_grid type=”two-up”][cs_block_grid_item title=”Block Grid Item 1″]One of the challenges nagging automakers is how to update security software once it is installed in the vehicle. Cyber threats are always changing and upgrading a car’s security software through downloads — much as you would update the software on a smartphone — has only recently become feasible.[/cs_block_grid_item][cs_block_grid_item title=”Block Grid Item 2″]In 2015, auto industry players created the Automotive Information Sharing and Analysis Center to swap information about cyber security threats and how to combat them. Then last October, the National Highway Traffic Safety Administration published a cyber security “best practices” guide for automakers with suggestions for building more secure vehicles.[/cs_block_grid_item][/cs_block_grid][/cs_column][/cs_row][/cs_section][/cs_content]