Monday, 21 September 2015

Fiat Chrysler recalls 8,000 more Jeeps over wireless hacking

 ‘No defect has been found. FCA US is conducting this campaign out of an abundance of caution.’ Photograph: Charles Krupa/AP

The recall affects the variants of the 2015 model of the FCAâs Jeep Renegade sports utility vehicle with a 6.5-inch touchscreen, over half of which FCA says are still in dealer hands.

Fiat Chrysler Automobiles (FCA) has recalled an additional 7,810 Jeeps affected by a widely reported bug that allows an attacker to wirelessly seize control of the vehicle.

FCA US has already applied measures to prevent the type of vehicle alteration demonstrated in a recent media document. These measures which necessary no customer or dealer actions block remote access to definite vehicle systems.

In a statement, the automobile firm said: â the campaign â which involves radios that differ from those implicated in another, similar recall â is designed to protect connected vehicles from remote alteration. If unauthorised, such interference constitutes a criminal act.

The Guardian view on automobile computer hacking: act now
Article: Automobile computer hackers have exposed how fragile network security is on lots of of the devices they rely on. They must cease the net of things turning from lovely to harm
 Read more
The company tried to ameliorate concerns, saying the program alteration addressed by this recall necessary distinctive & extensive technical knowledge, extended physical access to a subject vehicle & extended periods of time to write code.

The company is unaware of any injuries related to program exploitation, nor is it aware of any related complaints, warranty claims or accidents ân independent of the media demonstration.

â No defect has been found. FCA US is conducting this campaign out of an abundance of caution.

The latest recall, announced on the Friday before a three-day Labor Day weekend in The united states, is significantly smaller than the one.4 million automobile recall following the release of the security vulnerability.

No comments:

Post a Comment