DXPG

Total Pageviews

Sunday, August 11, 2013

Today’s Scuttlebot: Visualizing Web Activity and Vine’s Resilience

Log in to manage your products and services from The New York Times and the International Herald Tribune.

Don't have an account yet?
Create an account »

Subscribed through iTunes and need an NYTimes.com account?
Learn more »



Taking Over Cars, and Homes, Remotely

Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people. Now imagine you had absolutely nothing to do with the accident because your car was taken over by hackers.

Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of security intelligence at IOActive, a security research company, recently demonstrated car hacks at the Black Hat and DefCon computer security conferences in Las Vegas. The researchers completely disabled a driver’s ability to control a vehicle. No brakes. Distorted steering. All with a click of a button. While the demos were with hybrid cars, researchers warn that dozens of modern vehicles could be susceptible.

Hackers and security researchers are moving away from simply trying to break into â€" or protect â€" people’s e-mail accounts, stealing credit cards and other dirty digital deeds. Now they’re exploring vulnerabilities to break through the high-tech security of homes, cause car accidents or in some extreme cases, kill people who use implanted medical devices.

“Once any single computer in a car is compromised, safety of the vehicle goes out the window,” Mr. Miller said in an e-mail interview. Modern cars typically have 10 to 40 little computers in them.

“Right now, there aren’t a lot of ways for hackers to remotely attack cars: bluetooth, wireless tire sensors, telematics units,” he added. “But as cars get Internet connections, things will get easier for the attacker.”

Carmakers and the government are aware that our vehicles are vulnerable. In fact, Mr. Miller and Mr. Valasek received a grant from the Defense Advanced Research Projects Agency, or Darpa, to research ways carmakers can thwart attacks. The biggest fear is the future: as cars become more computerized â€" or become fully automated, computers on wheels that drive for you â€" they’ll become more inviting targets.

A video featuring two hackers showing Forbes’s Andy Greenberg their latest tricks with cars.

But the demonstrations by security experts and hackers weren’t a peek at what’s to come. The researchers hacked a Toyota Prius and Ford Escape, two hybrid cars that are already on the road.

Certainly, hackable cars are a troubling development for people who don’t even like to use cruise control.

Now to add to your paranoia: security researchers warned that our homes are more vulnerable than our cars to attackers. That is, if burglars trade in their lockpicks and crowbars for laptops and Wi-Fi scanners.

Devices like the Lockitron, a Wi-Fi enabled front door lock that can be used with a smartphone, could open a way for tech-savvy thieves to break into your home. That’s not to pick on Lockitron. They just happen to be on the cutting-edge of wireless home security.

“We’ve built Lockitron from the ground up with security in mind,” the company said in a statement, while acknowledging that “anyone claiming their system is ‘unhackable’ is wrong.” At the conferences, security experts lauded the company for the protection it has built into the Lockitron.

Hackers could also turn our televisions and Web cams against us, monitoring everything we’re saying and doing. Next generation light bulbs that are connected to the Web could be tampered with. Digital refrigerators could be turned off, spoiling food without your knowledge.

Some hacks could be mere practical jokes, albeit messy ones. Researchers have warned that the Bluetooth-enabled INAX Satis model toilets, which can be controlled via a smartphone app, could easily be hacked to spray water up instead of down. In response to warnings that its toilets could be hacked, INAX said it issued a security update for its toilets this month.

Yes, in the future, you will need to download security updates for your toilet.

And then, there are the usual smartphones fears. At BlackHat, Kevin McNamee, the director of Kindsight Security Labs, demonstrated how to take over an Android smartphone by injecting code through the game “Angry Birds.” Once he had control of the phone, Mr. McNamee was able to remove photos and personal data from the device without the owner having any clue.

Other researchers took over an iPhone by hacking a power adapter â€" yes, a little white power cord â€" to suck passwords and e-mails from a device that ran operating systems earlier than iOS 7.

But some of the most advanced, and scariest, security researchers are thinking about hacks of implanted medical devices.

Barnaby Jack, who was perhaps best known for a hack that made an A.T.M. spit out cash, was supposed to demonstrate at Black Hat how implantable medical devices, including a pacemaker, can be hacked to kill someone. But Mr. Jack died unexpectedly, shortly before he was to make his presentation. He was often referred to as an “ethical hacker” and hoped to show the pacemaker exploit as a warning to device makers.

So, should we dig holes in our yards, bury our computers and smartphones and never drive our cars again? Some researchers said many of these demonstrations were certainly provocative, but they were more theoretical than any sort of real risk we had to worry about today.

“Sometimes there is a gap between the researcher community and the real world. Researchers bridge this gap often, but it’s not uncommon to see conference talks on exotic technologies that don’t really impact our everyday lives just yet,” said Chris Rohlf, founder of Leaf Security Research, a security consulting company, in an interview. “As technology embeds itself into these everyday devices and other parts of our lives, you will see an increased focus on their security. Anywhere you find technology you’ll inevitably find hackers.”

But when these technologies do arrive, I would not count on the companies that are installing computers in our cars, homes and bodies to be able to stop rogue hackers.

“We haven’t figured out how to stop attacks against Web browsers in personal computers despite trying for the last 10 years, so there isn’t any reason to think that we can stop attacks against cars or other devices in the near future,” Mr. Miller said. “We should be concerned and start taking action now before something bad happens. I’ll still be using my car and refrigerator in the meantime though.”