Connect with us

Tech News

FBI issues warning regarding vulnerabilities and car hacking

The latest technology in our automobiles keeps us safer and offers added convenience, but do the risks of this technology outweigh the rewards?

Published

on

tesla

Tech updates increasing vulnerability

When my old car finally quit, the only “special” thing I wanted in my new-to-me car was a CD player. Technology has come a long way in the past ten years, but I still have the car with the CD player. However, I also use a FM transmitter to play my iPhone through the speakers. Newer cars come with a whole host of features aimed at keeping us safer and simplifying our lives through Bluetooth, Wi-Fi, and more, but do the vulnerabilities and risks of these features, outweigh the rewards?

bar

The FBI weighs in

The FBI along with the National Highway Traffic Safety Administration, have issued a safety bulletin addressing concerns that vehicles are being targeted more and more by hackers. While the latest issues of this have been resolved, they do want to make consumers and manufacturers aware of the potential problems. They stated in the bulletin: “The FBI and NHTSA are warning the general public and manufacturers of vehicles, vehicle components, and aftermarket devices to maintain awareness of potential issues and cybersecurity threats related to connected vehicle technologies in modern vehicles.”

Where are the vulnerabilities?

You may have heard about one of the more recent issues concerning the testing of the radio module. In August of 2015, a study [PDF] was published regarding researchers testing, targeting, and exploiting this particular device through attacking the vehicle through Wi-Fi and cellular connections. The radio module contained multiple wireless communication and entertainment functions and was connected to two controller area network (CAN) buses in the vehicle. Through their testing, researchers were able to shutdown the engine, disable the brakes and steering, trigger the door locks and turn signals, manipulate the tachometer, radio, HVAC, and GPS.

Vulnerabilities may exist within a vehicle’s wireless communication functions, within a mobile device – such as a cellular phone or tablet connected to the vehicle via USB, Bluetooth, or Wi-Fi – or within a third-party device connected through a vehicle diagnostic port. In these cases, it may be possible for an attacker to remotely exploit these vulnerabilities and gain access to the vehicle’s controller network or to data stored on the vehicle. Although vulnerabilities may not always result in an attacker being able to access all parts of the system, the safety risk to consumers could increase significantly if the access involves the ability to manipulate critical vehicle control systems.

Worried? Here’s 5 ways to minimize the chances of being hacked

1. Ensure your vehicle software is up to date: If your manufacturer issues a notification to update, it’s important that you do, but, verify that the update is genuine. Verify any recall or update notices by visiting your car’s manufacturer website. Clicking through emailed links presents the opportunity for hackers to send malicious links. Also, be wary of receiving USB and SD cards via the mail. Hackers could use this method to introduce malicious software into your car. Instead, check on your vehicle’s manufacturer’s website to identify the latest software updates. Use your own USB or SD card where necessary to download and transfer information. You can always check with your dealer or manufacturer before updating.

2. Be careful when making any modifications to vehicle software: Unauthorized updates could create increased vulnerabilities and change the way your car works.

3. Maintain awareness and exercise discretion when connecting third-party devices to your vehicle: Most modern vehicles have a standardized diagnostic port (OBD-II), which provides connectivity to the in-vehicle communication. Keeping these third-party devices secure is critical as a hacker may target them remotely as a way into your other systems. Do not connect any unknown or untrusted devices to the OBD-II port.

4. Be aware of who has physical access to the vehicle: Treat your vehicle the same way you do an unlocked smartphone, or computer: you don’t let people you don’t know touch it. Be cautious of who you leave your vehicle with; it only takes a few moments to upload hacking software.

Improving cyber security

While there are risks with using any technology, you want to be especially mindful of your automotive technology. The last thing anyone wants is to lose control of your vehicle. While the chances of this are minimal, you can decrease them even further by being actively aware of whom you leave your car with, your surroundings, and your technology system.

The rewards of technology outweigh the risks, especially when you consider the increased safety benefits of advanced technology; however, there is always a chance someone will turn this technology to their advantage. The NHTSA is actively working on initiatives to improve cyber security in vehicles.

To increase your security, please, follow the FBI’s tips above, or you can reach out to local law enforcement and the FBI with questions and concerns via the Internet Crime Complaint Center, or file a complaint with them.

#ProtectingYourSmartCar

Jennifer Walpole is a Senior Staff Writer at The American Genius and holds a Master's degree in English from the University of Oklahoma. She is a science fiction fanatic and enjoys writing way more than she should. She dreams of being a screenwriter and seeing her work on the big screen in Hollywood one day.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech News

Facebook policy sets themselves up for yet another failure

(TECH) Facebook’s role in news consumption increases, and their new policy regarding news is raising eyebrows.

Published

on

facebook

Facebook did not get a lot of likes a when it was facing scrutiny for taking money for Russian ads, and their subsequent role in the 2016 Presidential election. In response to that, Facebook announced its Ad Archive – a public political archive to allow users more transparency in who purchased those ads like you can on television. Additionally, they changed their political ads policy.

Of course, the goal of this is to promote transparency and give the public an opportunity to scrutinize advertisers and have more control about what they do with that information. Facebook and the world at large acknowledges that still isn’t a perfect solution, and there are many problems left to work out, including how perpetrators can get around the new rules by simply setting up an LLC.

Now, Facebook says they will include news pages in their Ad Archives. While this decision was originally opposed by many news publishers, and Facebook compromised by putting them in a separate category, it has officially become part of Facebook policy.

To be a news page, there are several criteria pages and promoters must follow, including focusing on current events and news, spreading factual and true information, and publishing content that is not user generated or aggregated from other areas of the web. Also, the amount of advertising content can not exceed the amount of content related to news.

Facebook’s decision to include news publishers involved some input from The Trust Project was a decent step, but it’s almost certain that many publishers are raising their eyebrows at the decision to include them in the archive, with the indication that news organizations are as suspect as corrupt Russian players. It is particularly grating in an environment where Twitter has opted not to lump news and Russian actors together.

Certainly, how publishers spend their dollars and make platform decisions will be impacted, especially as this continues. Given the broad domains of ad archive – elections, elected officials, and issues of national importance – we are likely to see how things play out over the next few months.

The biggest concern of course, is how this sets Facebook up for another failure in regards to how it handles news, and how this will impact the people receiving that news. And hopefully, we find out before the stakes are too high.

Continue Reading

Tech News

Quickly delete years of your stupid Facebook updates

(SOCIAL MEDIA) Digital clutter sucks. Save time and energy with this new Chrome extension for Facebook.

Published

on

facebook desktop

When searching for a new job, it’s always a good idea to scan your social media presence to make sure you’re not setting yourself up for failure with offensive or immature posts.

In fact, you should regularly check your digital life even if you’re not on the job hunt. You never know when friends, family, or others are going to rabbit hole into reading everything you’ve ever posted.

Facebook is an especially dangerous place for this since the social media giant has been around for over fourteen years. Many accounts are old enough to be in middle school now.

If you’ve ever taken a deep dive into your own account, you may have found some unsavory posts you couldn’t delete quickly enough.

We all have at least one cringe-worthy post or picture buried in years of digital clutter. Maybe you were smart from the get-go and used privacy settings. Or maybe you periodically delete posts when Memories resurfaces that drunk college photo you swore wasn’t on the internet anymore.

But digging through years of posts is time consuming, and for those of us with accounts older than a decade, nearly impossible.

Fortunately, a new Chrome extension can take care of this monotonous task for you. Social Book Post Manager helps clean up your Facebook by bulk deleting posts at your discretion.

Instead of individually removing posts and getting sucked into the ensuing nostalgia, this extension deletes posts in batches with the click of a button.

Select a specific time range or search criteria and the tool pulls up all relevant posts. From here, you decide what to delete or make private.

Let’s say you want to destroy all evidence of your political beliefs as a youngster. Simply put in the relevant keyword, like a candidate or party’s name, and the tool pulls up all posts matching that criteria. You can pick and choose, or select all for a total purge.

You can also salt the earth and delete everything pre-whatever date you choose. I could tell Social Book to remove everything before 2014 and effectively remove any proof that I attended college.

Keep in mind, this tool only deletes posts and photos from Facebook itself. If you have any savvy enemies who saved screenshots or you cross-posted, you’re out of luck.

The extension is free to use, and new updates support unliking posts and hiding timeline items. Go to town pretending you got hired on by the Ministry of Truth to delete objectionable history for the greater good of your social media presence.

PS: If you feel like going full scorched Earth, delete everything from your Facebook past and then switch to this browser to make it harder for Facebook to track you while you’re on the web.

Continue Reading

Tech News

Why are all apps starting to look exactly the same?

(TECHNOLOGY) As apps evolve, they are beginning to look uniform – is this a good or bad thing?

Published

on

apps looking uniform

Have you noticed that all apps are beginning to look a lot alike? Many popular social media apps are utilizing minimalist designs, featuring lots of black and white with negative space and little color.

At a glance, you may not be able to differentiate what’s Airbnb and what’s Instagram. Normally, something like this could be argued to be unoriginal and boring. However, let’s look at the positives.

If every app – for the most part – is operating with the same design, they’re not trying to constantly one-up each other with the next big look. As a result, they have more time to focus on what’s important – the content found on the app and the functions of the app.

While many apps offer similar features (like Snapchat, Facebook, and Instagram both having Stories), every social media app has its own flair that keeps users coming back. And, user retention is higher if they feel comfortable using the app – which is another plus of them all having similar designs.

If you have 12 different social media apps with 12 different interfaces and means of operation, it’s unlikely that a user will keep up with all 12. But, if they know exactly how to use them, the user can flip back and forth like it’s nothing.

However, “app fatigue is a real thing,” said Yaz of UX Collective. “Most people have grown tired of bouncing between too many apps or learning how to use a new interface after every new download.”

Below is Yaz’s exploration of the uniformity in apps:

Research has found that a quarter of all apps are deleted after just one use. People tend to stick with the apps that they have found made a positive impact in their lives – either for communication with others or apps that save them time.

Uniformity means developers can spend more of their time on creating the content that will aid in better communication and more time saving options.

Again, what it comes down to is the content and function. That’s where the true creativity comes in. People aren’t using Airbnb because the app or the website are ridiculously exciting; they’re using it because it offers a service that is beneficial.

What are your thoughts on app uniformity? Unoriginal, or a stepping stone for what’s really important?

Continue Reading
Advertisement

Our Great Parnters

The
American Genius
news neatly in your inbox

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Emerging Stories