Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Friday, 14 February 2014
On 06:44 by Unknown in Bluetooth Hacking, CAN Hacking Tool, Car Hacking, Hacking Car, Hacking News, Smart Car, Smart Device No comments
You definitely have heard about hacking a computer any device or a network but have you heard about hacking a car with a small device. What is it really possible. This might be your question. Yes it is possible, I will tell you about it. Let's get started.
Hacking a Car remotely with $20 iPhone sized Device
In the era of Smart devices, we have Smartphones, Smart TVs, Smart Fridges, and even the Smart cars! We have made our life very easy and comfortable by providing the master control of every task to such smart devices.
But imagine if an attacker wants to take revenge or hurt someone, now they can hack your car, rather failing breaks in the traditional way. Sounds Horrible !
WELL, Two Security researchers - Javier Vazquez-Vidal and Alberto Garcia Illera have developed a home-made gadget called 'CAN Hacking Tools (CHT)', a tiny device smaller than your Smartphone, which is enough to hack your Cars.
WELL, Two Security researchers - Javier Vazquez-Vidal and Alberto Garcia Illera have developed a home-made gadget called 'CAN Hacking Tools (CHT)', a tiny device smaller than your Smartphone, which is enough to hack your Cars.
The Kit costs less than $20, but is far capable to give away the entire control of your car to an attacker from windows and headlights to its steering and brakes.
The device uses the Controller Area Network (CAN) ports that are built into cars for computer-system checks, and draws power from the car’s electrical system. Injecting a malicious code to CAN ports allows an attacker to send wireless commands remotely from a computer. Once hackers take hold of this network they can control lights, locks, steering and even brakes.
“It can take five minutes or less to hook it up and then walk away,” says Vazquez Vidal toForbes, adding, “We could wait one minute or one year, and then trigger it to do whatever we have programmed it to do.”
They have already tested their CHT device on four different vehicles and successfully did tricks, including applying Emergency brakes while the car was in motion that could potentially cause a sudden stop in traffic, switching off headlights, setting off alarms, and affecting the steering.
Till now their device is capable to communicate via Bluetooth only, which is limited to minor range, but soon they will upgrade it to use a GSM cellular radio that would make their device possible to control from miles away.
“All the ingredients of their tool are off-the-shelf components, so that even if the device is discovered, it wouldn’t necessarily provide clues as to who planted it. It’s totally untraceable”, says Vazquez Vidal. “A car is a mini network,” says his second partner Garcia Illera adding, “And right now there’s no security implemented.”
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment