Tesla and the 360 big PK data era do want to prevent "hacker"

Source: Internet
Author: User
Keywords Tesla 360 hacker indeed

IT industry "Scrappy" 360, has recently been http://www.aliyun.com/zixun/aggregation/6412.html "> Automobile Enterprises." Last week, 360 companies said their team had studied the Tesla model S car and found design flaws in Tesla's application process. Using this loophole, attackers can remotely control the vehicle, unlock, whistle, flash, open skylight and other operations, and can open the skylight in the vehicle's driving. So, 360 public "frame", through the game way to let "technical curtilage" to find Tesla's procedural flaws.

Zhejiang University students took the top but failed to crack Tesla

To this end, 360 companies held a "Tesla crack challenge" to attract the network Yingjie to challenge. According to the introduction, the challenge is divided into two kinds of competition, the first is the integration tournament, according to the severity of the vulnerability found by the Challenger, give the contestants the corresponding points, each 100 points can be exchanged for 100 yuan; the second, the ultimate Challenge, requires the contestants to unlock the doors completely, open the engine and eventually drive Tesla. Winners of the ultimate challenge can get 10000 dollars in cash prizes.

Finally, after nearly two days of fierce battle, two students from Zhejiang University composed of "Yo" portfolio, with 10600 points in the first place, won the prize Rmb 10600 yuan. But to give Tesla a sigh of relief, until the end of the game, no one can successfully crack, complete the final task, so the 10,000-dollar award has no success.

It is reported that the competition attracted 9 teams to participate, including the Chinese Academy of Sciences Software Institute and other research institutions, universities have participated. And 360 passed the show, saying the main idea was to arouse the attention of major carmakers to the safety of their products-and, of course, the safety of the computer and the applications.

Earlier, 360 companies found that the Tesla automotive application process has a design flaw, but the impact of the vulnerability is not serious, the owner as long as the shutdown remote control can effectively withstand the vulnerability. Currently, 360 has formally submitted the relevant vulnerability details and solution proposals to Tesla and is willing to provide technical support for Tesla to fix the vulnerability.

Intelligent, large data age does have to prevent "hackers"

The goal of 360 is not to "show", but the game can really cause the car industry practitioners to ponder.

In fact, with the increasing degree of electronic, coupled with the rise of car networking technology, unmanned technology, especially Apple, Google and other internet giants and carmakers more and more cooperation, cars are more and more like an IT product. In addition, according to a number of foreign market institutions, even if the car does not calculate the full vehicle production, the global car networking related market scale in the next 5 years will also reach an alarming 200 billion U.S. dollars. Such a huge market, naturally will cause "hacker" attention. According to reports, foreign research institutions reported that at present hackers have achieved at least 3 kinds of ways to invade smart cars, although there is no large-scale hacking of smart cars, but this means that hackers may have been eyeing the car networking industry, and are making the necessary technical preparations.

If hackers can really invade and remotely control cars, the safety of the passengers will be greatly threatened-even more so than the active and passive safety that the automakers have been emphasizing.

In addition, leaking owner privacy is a big data era has to prevent a point. More than 60% of carmakers will be exploiting more data over the next two or three years, including drivers ' routes, driving habits and service needs, according to Niranjan Manohar, analyst at Frost Shaliven Consulting, a global business growth consultancy. This data collection did not take the initiative to obtain the owner's consent. Even more frightening is the fact that the "confidential work" of these data is not in place, and that insurance companies, communications companies and even hackers are likely to get it easily, which will result in the disclosure of personal privacy.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.