Smart cars face security thresholds Google sets up car companies to study driverless

A few days ago, according to the British "Guardian" report, Google Inc. quietly set up a car company to promote the safety research work of driverless cars. Currently, Google Motors is negotiating with General Motors, Ford, Toyota, Daimler and Volkswagen. According to sources, Google has set up a special car company mainly to cope with the frequent "car hacking" problem around the world. On this year's HackPWN, a number of cars, including Tesla and Mercedes, were hacked.

For smart cars that have already appeared on the market to access the Internet, some analysts believe that there are no small security risks, and some people think that this is a big problem. But what is the real situation? Liu Jianwei, a 360 security researcher at the offensive and defensive laboratory and a Cisco network security expert, told the media that consumer concerns are not superfluous – it is practical to remotely invade and operate the car. In fact, many functions of smart cars and mobile phones are encrypted, but some smart cars are still weak in security.

Smart cars are not safe, attracting giants into Google

The film "Minority Report" is a model textbook for driverless cars. The futuristic picture in the film has impressed many viewers. In 2054, in the electromagnetic energy system, all kinds of vehicles were suspended in the network woven by the road, driving at a high speed of 80-100 km per hour; at the same time, the owners only need to sit in it and drink tea to watch the life. No need to worry about road conditions, speed or police tickets.

However, unmanned technology has been realized, but it is still a "semi-finished product." According to the network security engineer, "The emergence of driverless cars has indeed provided us with a lot of convenience. For example, we don't need to control the throttle, steering wheel and brakes in the car. Just set the destination in advance and you can watch movies all the way. Listening to music. However, the contradiction between safety and convenience has always existed, and the more convenient things, the more insecure it is."

For example, at the HackPWN Safe Geek Carnival, a series of top luxury cars were hacked and manipulated. Hackers can take advantage of the software and hardware vulnerabilities of these cars, "remote control" through their mobile phones, and even control the start and brake of a car several kilometers away.

In fact, this remote control of the car has not only appeared on safe geek parties like HackPWN. Former US National Security Agency former staff Charlie Miller and cybersecurity researcher Chris Varasek also recently showed Wired magazine reporter Greenberg the wonderful performance of remotely maneuvering cars. They succeeded in getting a car. The Jeep Grand Cherokee brakes urgently during high-speed driving.

As hackers around the world crack more and more into cars, Google’s driverless cars are also facing increasing security threats. From the documents submitted by Google Motors to the National Highway Traffic Safety Administration, these cars are designed with rear-wheel drive and each wheel has its own brake system. Google tried to break up the security threat of hacking by spreading a master control hub.

However, security experts believe that even if every wheel has its own brake system, if a hacker really wants to create a traffic accident, it is enough to control one wheel of the car.

In the era of all things connected, it is the most valuable to achieve "everything is safe"

The safety of smart cars is only a drop in the ocean. In the era of the Internet of Everything, it is an urgent issue for network security engineers to consider "all things safe."

With the approach of HackPWN, 360 security expert Liu Jianwei conducted a special training on "Hacking everything, Everything is hack" for some college students engaged in technical research. Combined with the attack examples of today's smart homes, the hardware attack was systematically introduced. The training inspired college students. Our interest in smart home cracking, but also a deeper understanding and understanding of hardware attacks, mastered the basic ideas of intelligent hardware cracking.

The technical staff said: "'Cracking' is for 'anti-cracking', just as if you want to make a top-level shield, you must study the good spear."

Internet commentator Jin wrong knife wrote in a comment: "The Internet makes cars, either die or become a billion unicorns." In this regard, security technicians have completely different views, "Internet car, unsafe Only death. Even if it can become a billion unicorn, it will become a dead beast."

The security technician further said that all kinds of home appliances are now connected to the Internet. If it is not safe, it will one day bring more terrible problems than power outages and water cuts.

In this year's HackPWN hardware cracking contest, white hat hackers who are interested in "cracking" are invited to jointly explore the security vulnerabilities of popular smart devices and intelligent systems in the market, so as to promote the industry's common concern and participate in the IoT era security protection, since June. Since the opening of the registration on the 15th, it has attracted many security geeks to register.

Optical coupler is also called  optical splitter , is one of the most important passive devices in optical fiber link, is with multiple inputs and multiple output end of the optical fiber connected devices. The fiber optic splitter by the light splitting principle can be divided into the fused biconical taper (FBT type) and planar waveguide type (PLC type). 


PLC Splitter, With SC/APC Connector,SC/UPC Connector, LC/APC Connector LC/UPC Connector 

Bwinners Telecom Communication products include: Fiber Optic Splice Closure, FTTH Fiber Optical Distribution Box, FTTH Fiber Optic Socket Face Plate, Fiber Optic Patch Panel Terminal Box, ODF Optical Fiber Distribution Frame, OCC Optical Fiber Cross Connection Cabinets, Network Cabinet, Equipment Enclosure, PLC Splitter, Fiber Optic Patch Cord , Fiber Optic Adapter , Fiber optic pigtail, FTTH Accessories, etc.

 

Bwinners Equipment Enclosure includes all kinds of Equipment Enclosure, wall mounting enclosure, junction box, network box, electrical enclosure box, stainless steel enclosure, electronic equipment racks, metal cabinets, metal enclosure CATV enclosure, etc. 

Rack Mounted Sc Apc 1x64 Plc SplitterRack Mount 2x64 Plc Splitter With Sc Apc Connector 21u Rack Mounted Sc Apc 1x64 Plc Splitter

Fiber Optic PLC Splitter

fiber optic splitter plc, fiber optic cable splitter, optical splitter, Mini Type PLC Splitter, Cassette Type PLC Splitter, Insertion Module PLC

Sijee Optical Communication Technology Co.,Ltd , https://www.sijee-optical.com