" />

Researchers display “CAN do” skill in vehicle DoS

Add one more to the lengthening list of ways your connected car can get hacked. The NCCIC/ICS-CERT (National Cybersecurity and Communications Integration Center/Industrial Control Systems Cyber Emergency Readiness Team) issued an “alert” late last week following the release of a research paper on, “a vulnerability in the Controller Area Network (CAN) Bus standard with proof-of-concept (PoC) exploit code affecting CAN Bus.” That, according to researchers Andrea Palanca, Eric Evenchick, Federico Maggi, and Stefano Zanero, can allow an attacker, “to perform a denial-of-service (DoS) attack (on) automotive networks.” Which, in the case of vehicles, is more of a “denial of control” attack.

Read full news article on Naked Security