Tesla sends out software patches Over the Air Patch

21.41
Tesla sends out software patches Over the Air Patch - security vulnerabilities

Kevin Mahaffey, co-founder of Lookout security company and Marc Rogers, senior researcher of security to CloudFlare has found a way to hack the flagship model car system S line of Tesla to take control of some components of the car. It was demoed a few days ago to computer security conference Black Hat.

How they hack the car system? To do this, they physically connect a computer to the car via the Ethernet cable and leave behind a Trojan Horse to allow remote access. What is the impact of this piracy? Once they have entered the system, they will be able to initiate brake, causing the car to stop suddenly if the car goes under 5mph. However, if the car was traveling over 5mph and then the car is coasting forcing the pilot to navigate safely on the side of the road, no doubt.

Fortunately, the researchers worked with Tesla for software patches and after the patch has been stabilized, the company deployed using OTA (Over the Air) update automatically the car software that will then patch these vulnerabilities.

for comparison, it seems that the way Tesla manage working bug fixes is more effective than the way Chrysler deal. Chrysler shipped about 1.4 million USB drives to all affected car owners and so there would be some time before the owners plugs the USB into the car system which would then make it vulnerable during this period.

Previous
Next Post »
0 Komentar