![]() |
Chrysler Uconnect Security Flaw
If you own Chrysler vehicle (Jeep Cherokee) or anything with Uconnect please listen up... whitehat hackers have demonstrated remote control over these affected vehicles, and will present it at Black Hat security conference in Las Vegas next month. This is a working exploit which Chrysler is aware and fixing. If you get the service bulletin get it patched ASAP.
Couple of links to same news: http://www.wired.com/2015/07/hackers...-jeep-highway/ http://gizmodo.com/hackers-have-the-...lio-1719233440 Folks, this is serious. If you have one of the affected vehicles, take it in ASAP. I work in IT security. My 2¢ is avoid this feature, and any wireless service for at least several years if you can opt out of getting them. Some engineers/marketers insist on repeating the mistakes of the past. This type of issue has been theoretical for years now, and possible via the ODBCII connection (which is silly of course), but you can bet black hat hackers on working on the same thing for more than Chrysler. The arms race for vehicle hacking is only just beginning. idk if this link can help you, but here it is: http://www.driveuconnect.com/software-update/ |
Thats awesome:)
Though I have a 2015 ford w/ similar capabilities that I never enabled. I always wonder if its still vulnerable to this type of stuff. Off likely isn't really OFF. |
Just patched my Jeep. At least there's a way for owners to download and update the entertainment system easily.
ed |
| All times are GMT -4. The time now is 08:13 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2026, vBulletin Solutions, Inc.