Making technology work for you...

Get Your Free Subscription By Email:

[Video] Hackers Can Kill Your Jeep On Highway Remotely From Internet

Anything connected to the internet is vulnerable to outside access and security violation by hackers, and network connected "Smart Cars" are no exception. Just imagine the horror of having your car taken over by hackers remotely while you are driving at high-speed on a highway, and suddenly the vents of your car starts blasting cold air at the maximum setting, the radio switched to the local hip hop station at full volume, the windshield wipers turned on and wiper fluid blurring the glass while you push buttons on your dashboard to stop this mayhem without any success. This is no longer a imaginary situation as two hackers demonstrated the zero-day exploit they found in Jeep Cherokee to Wired reporter Andy Greenberg and as shared in the video below.

Remote Car Exploit Demonstration

As you can see in the video shared below this is horrifying and I would guess would push companies towards using more secure automotive technology. But on the flip-side this might also allow them to control and copyright of car software in a manner which could stop mechanics and car enthusiasts from repairing and modifying vehicles.

Image and video credits to Wired


This was a very dangerous stunt. These idiots isolated a driver on a freeway with no warning, presenting the person in the car AND the traffic behind with a potentially deadky situation.
Yes, they wanted to show th hack exploit, but it may have had a VERY different outcome.
I think they guys aren't cool, just stupid !!!

Link to the video since there is something wrong with the provided one:

Just checked the above video and it works fine, also your video now says "Hackers Remotely Kill a Jee..." This video is no longer available due to a copyright claim by ModernWorksPub. "

Add new comment

This is just one of the many helpful tips we have posted, You can find more stories here,
Do subscribe to updates using your favorite RSS feed reader or using the secure FeedBurner email update form on top of this post.