|
|
|
|
|
|
#1
|
||||
|
||||
|
Hackers have been hard at work hacking any new technology they can find. If you think Microsoft Windows is all they can break then you are in for a rude awakening.
For example: 1) Car Navigation Systems Many of the newer nav systems use a technology called Radio Data System-Traffic Message Channel (RDS-TMC). This is used to receive traffic broadcasts and emergency messages. Hackers have figured out how to send bogus traffic reports and even worse, send DDOS attacks which can bring down your nav system and possibly your climate control and stereo if it's a factory integrated unit. 2) WiFi sidejacking Hackers have developed a powerful WiFi sniffing tool named "hamster" that can easily grab your WiFi packets out of the air and decode your cookies and URLs you have visited. With that information the hacker can access any of your on-line accounts that you have been recently accessing unless you have logged off. If you simply close your browser instead of logging off then you are vulnerable. 3) Eighteen-wheelers More manufacturers are using RFID-based electronic product codes on merchandise instead of just UPC bar codes. Hackers have figured out how to remotely scan an entire trailer to figure out the contents including product information and serial numbers. This will be popular for industrial espionage if you want to know what your competitor is shipping or simply to help thieves figure out which truck to rob. 4) Financial Information Exchange (FIX) This is the application protocol used by financial services firms, stock exchanges and investment banks for automated financial trading. Hackers have figured out how to implement DDOS attacks, session-hijacking and "man in the middle" attacks. 5) iPhone Hackers have figured out how to install "rootkits" on the Apple iPhone which allows them to control all aspects of the phone including the camera, microphone, contact list and phone hardware. It makes for a great spying device! All of this new technology is great but it creates new opportunities for the bad guys! Everything from cars to home thermostats to refrigerators are becoming high-tech and remotely accessible.
__________________
Bill Wood - Retired Webmaster My Personal Website 1998 Mercedes E430 2010 Toyota Sequoia My Photo Albums |
|
#2
|
||||
|
||||
|
Id like to see them hack a 617.
In all seriousness, I have an iPhone.... I am a bit worried, but not super worried.
__________________
-Justin 91 560 SEC AMG - other dogs dd 01 Honda S2000 - dogs dd 07 MB ML320 CDI - dd 16 Lexus IS250 - wifes dd it's automatic. |
|
#3
|
|||
|
|||
|
#4
|
||||
|
||||
|
Yep
With the mandate for remote vehicle shutdown, it is stupid to expect these scum to ignore vehicle systems.
http://72.14.205.104/search?q=cache:4Uo-V_R9C5cJ:www.internationaldelivers.com/assets/pdf/homelandsecurity.pdf+us+mandate+remote+vehicle+shutdown&hl=en&ct=clnk&cd=5&gl=us Turning cars into crime stoppers http://www.usatoday.com/money/autos/2003-07-23-securecars_x.htm |
|
#5
|
|||
|
|||
|
Daaaamn!
|
|
#6
|
||||
|
||||
|
This is why I unplug my cable modem at night, and while I'm at work. Hack that you SOB's.
__________________
2016 Corvette Stingray 2LT 1969 280SE 2023 Ram 1500 2007 Tiara 3200 |
|
#7
|
||||
|
||||
|
I've been connected 24/7 to the wonderful wooly Internet for 3 years now - no hacks. The machine that is actually connected to the cable modem runs OpenBSD with the standard packet filter (pf) firewall. Obviously not a Winderz machine.
__________________
1984 300TD |
|
#8
|
||||
|
||||
|
we just can't leave anything alone...
I hacked my old T83... well.. overclocked it... |
|
#9
|
||||
|
||||
|
Hacking is a disease of sorts, a power trip which gives these rank losers satisfaction of doing something wrong and getting away with it. Its a pity, some of the hackers and malware writers are quite talented programmers as well and have thorough knowledge of the internal working of particular programming language they hack. They are brilliant in that sense but its a spectacular waste of good talent that can be channelized to so many more useful things.
__________________
99 Gurkha with OM616 IDI turbo 2015 Gurkha with OM616 DI turbo 2014 Rexton W with OM612 VGT |
|
#10
|
||||
|
||||
|
This is a scary thought...
The brand new Boeing 787 Dreamliner has internet access in the passenger compartment for all to use. The problem is that it is on the SAME NETWORK that the airplane's flight control, navigation and communications systems are on. Nobody has hacked it yet but, it could be a matter of time. I can just see it now. Some 16 year old script kiddie plants a backdoor trojan on a 787's computer and then decides to fly it like his own big Radio Controlled airplane. ![]() More info here
__________________
Bill Wood - Retired Webmaster My Personal Website 1998 Mercedes E430 2010 Toyota Sequoia My Photo Albums |
|
#11
|
||||
|
||||
|
This is some sobering ****. Especially the part about being able to scan a truck for exact cargo on-board.
Looking like a brave new world for thieves.
__________________
Te futueo et caballum tuum 1986 300SDL, 362K 1984 300D, 138K |
|
#12
|
||||
|
||||
|
Quote:
Can't hack a B29! Heck my calculator probably has more computing power then a dozen of them. But they were good enough to win the war! We don't need this new crap!
__________________
2016 Corvette Stingray 2LT 1969 280SE 2023 Ram 1500 2007 Tiara 3200 |
![]() |
| Bookmarks |
|
|