Beware!! Your car can be stolen via SMS!
Again confirmed the car technology that it has serious flaws and has great advantages as researchers revealed without Bailey and Matthew Sulenak ISEC Company of America for their ability using mobile text messages to open the car doors and even run the engine too.
Researchers were able to discover one of the protocols used by companies to control the remote in the car it took them two hours to intercept these messages and wireless reproduced through the computer.
It seems that the intercept these messages is the first step that enables communication system with the entire car and even change the programs (software) for its laws, but more dangerous, the same technique can be used to penetrate other systems such as systems, traffic control, cameras, streets and tracking systems security situation, but worse, during which it can penetrate and attack sensors networks, electricity, water and telephone.
The announcement came during a security conference in Las Vegas without revealing where the U.S. and Matthew for the possibility of using a mobile phone to the implementation of this breach, which they called "war of text messages," the researchers did not reveal the secrets of their findings to the courtesy car companies.
Again confirmed the car technology that it has serious flaws and has great advantages as researchers revealed without Bailey and Matthew Sulenak ISEC Company of America for their ability using mobile text messages to open the car doors and even run the engine too.
Researchers were able to discover one of the protocols used by companies to control the remote in the car it took them two hours to intercept these messages and wireless reproduced through the computer.
It seems that the intercept these messages is the first step that enables communication system with the entire car and even change the programs (software) for its laws, but more dangerous, the same technique can be used to penetrate other systems such as systems, traffic control, cameras, streets and tracking systems security situation, but worse, during which it can penetrate and attack sensors networks, electricity, water and telephone.
The announcement came during a security conference in Las Vegas without revealing where the U.S. and Matthew for the possibility of using a mobile phone to the implementation of this breach, which they called "war of text messages," the researchers did not reveal the secrets of their findings to the courtesy car companies.