![]() |
![]() |
#1 (permalink) | |
Junkie
|
Computer viruses infecting onboard computers in cars!
http://news.zdnet.com/2100-1009_22-5551367.html
Quote:
![]() |
|
![]() |
![]() |
#3 (permalink) |
Psycho
Location: Scottsdale, AZ
|
yeah, this is not going to be good if its true. fuck if i'd drive a car that could get some sort of virus.
i could definately see some bad shit coming out of this, accidents, cars losing functionality while driving. luckily though, the more serious virus threats are tracked down to the source. the first time some big shit happens on the road as a result of this, the shit will be hitting the ceiling with the feds. |
![]() |
![]() |
#4 (permalink) |
Crazy
|
It was bound to happen. Japanese manufacturers leave ECUs open. Some US companies have made it so that you cannot modify the system of their cars. When the ECU was turned off it would reset each time to prevent modifications without a special by pass chip.
The Japanese have left this open for OBD (Sensor Testing for diagnostics by a mechanic) so that a trained mechanic will be able to screw around with the setting incase a vechicle needed it or if it was tuned with aftermarket equipment. But they dont want you to know that. |
![]() |
![]() |
#5 (permalink) |
Crazy
Location: San Diego
|
not sure how big a threat this really is. besides the difficulty of infection (bluetooth being slow and limited range to begin with) there is the actual trouble of infecting something vital. a lot of cars computers functionality is still hardwired into it. a BCM (body control module) can not be reprogrammed to act as the PCM (powertrain control module) or as a EBCM (electonic brake control module, aka abs/traction control/stability system). furthermore the actual programing of any key module can not occur with the engine running, and often can require fuses to be pulled as well as a key cycle to be made. the changable software is stored on EEPROM chips, while the base factory code that provides the basic functionality is stored on EPROM chips and ROM. so unless a module has been design to recieve and proccess new software rapidly (such as with navigation systems), the threat posed is basicly non existant.
second is communications. currently there are multiple bus protocols used on vehicles as well as multiple netwrok designs. until it is required for all vehicles to use a CAN bus, any virus created will have to be engineered specificly to travel along a given model/years internal network. crxforum, at the core you are misunderstanding the purpose and implemintation of OBD/OBDII standards. the suggest you are making about it, is at its core false, nor applicable to this threat. |
![]() |
![]() |
#6 (permalink) |
Crazy
|
This kind of speculative crap has all the hallmarks of a weakly-constructed PR stunt.
I love the fact that they created this article out of NOTHING: here's Kaspersky commenting on something he clearly hasn't even checked out yet, but for some reason the reporters are already there before he's even had a chance to look at the patient. And the time frame 'last weekend' oh please! "Well I remember it was, erm, last weekend because, uh, I was uh, trying to think of an imprecise time for my bogus story, and then it came to me." "Everyone's bored of computer viruses now, so how do we get em all scared again so we can sell more of our overpriced, silly anti-virus code, and our 'update definitions' files that contain absolutely nothing? Oh yeah, let's tell them their cars are under threat, that usually motivates Americans." Why is everybody so scaredy and pathetic these days? It's like everyone WANTS an excuse to be afraid, and these guys are profiting. |
![]() |
Tags |
cars, computer, computers, infecting, onboard, viruses |
|
|