Feeds

McAfee puts Barnaby Jack on car-jacking hackers' case

Security whiz to thwart actual crashes

Boost IT visibility and business value

McAfee has put together an elite team of researchers to investigate how to go about protecting car systems from next-generation hacking attacks.

Members of the team include Barnaby Jack, the security researcher best known for demonstrating ways that crooks can force ATMs to spit out cash and for highlighting security shortcomings in insulin pumps.

Modern cars increasingly rely on embedded processors. Security researchers have already demonstrated how these embedded systems might be hacked to generating bogus tire blowout warning messages or pull off other dangerous exploits. Attack scenarios include injecting malware using via on-board diagnostics systems, wireless connections and booby-trapped CDs.

No such attacks have ever taken place in the real world but car manufacturers and auto industry associations are already aware of the possible risk.

SAE International, a global association of more than 128,000 engineers and related technical experts in the aerospace, automotive and commercial-vehicle industries, has put together a number of technical papers that look into information security risks that look beyond potential concerns about hacking into electronic vehicle access systems, which have been an issue for several years.

"Vehicles include more and more electronic systems and open communication channels based on public standards, making them vulnerable to a variety of attacks," the abstract to one recent SAE technical paper explains. "Security mitigation mechanisms are implemented in software and might be supported by a controller with basic security features," it adds.

"Any cyber security breach carries certain risk," said Jack Pokrzywa, SAE's manager of ground vehicle standards, the Daily Tech reports. "SAE Vehicle Electrical System Security Committee is working hard to develop specifications which will reduce that risk in the vehicle area."

Meanwhile Ford and Toyota have both recruited information security experts to look into the potential problem. Ford, for example, has hired infosec experts to make its SYNC in-vehicle communications and entertainment system more resistant against hackers and malware.

The McAfee team will be assigned to looking into much the same issues but with a slightly different mandate, geared towards developing security software and other protection technologies suitable for car-based embedded computing systems.

Bruce Snell, a McAfee executive managing the firm's research on car security, told Reuters via PCPro. "If your laptop crashes you'll have a bad day, but if your car crashes that could be life threatening.

"I don't think people need to panic now. But the future is really scary," he added. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?