It's possible they just failed to reset service account or other
administrative account passwords, rather than leaving his account active
(which if he had access to, should've been part of their procedures). What I
found funny is the fact they labeled him a "hacker" when he was so easily
tracked down.

- Sean

On Fri, Mar 19, 2010 at 7:38 AM, Sherry Abercrombie <[email protected]>wrote:

> What I find amazing is that the fired employee's account wasn't disabled
> immediately upon termination.  Sheesh, talk about asking for trouble.....
>
>
> On Fri, Mar 19, 2010 at 10:33 AM, Mike French <
> [email protected]> wrote:
>
>>  46. March 17, Wired – (Texas) Hacker disables more than 100 cars
>> remotely. More than 100 drivers in Austin, Texas found their cars disabled
>> or the horns honking out of control, after an intruder ran amok in a
>> web-based vehicle-immobilization system normally used to get the attention
>> of consumers delinquent in their auto payments. Police with Austin’s High
>> Tech Crime Unit on March 17 arrested a 20-year-old who was a former Texas
>> Auto Center employee who was laid off last month, and allegedly sought
>> revenge by bricking the cars sold from the dealership’s four Austin-area
>> lots. The dealership used a system called Webtech Plus as an alternative to
>> repossessing vehicles that haven’t been paid for. Operated by
>> Cleveland-based Pay Technologies, the system lets car dealers install a
>> small black box under vehicle dashboards that responds to commands issued
>> through a central website, and relayed over a wireless pager network. The
>> dealer can disable a car’s ignition system, or trigger the horn to begin
>> honking, as a reminder that a payment is due. The system will not stop a
>> running vehicle. Texas Auto Center began fielding complaints from baffled
>> customers the last week in February, many of whom wound up missing work,
>> calling tow trucks or disconnecting their batteries to stop the honking. The
>> troubles stopped five days later, when Texas Auto Center reset the Webtech
>> Plus passwords for all its employee accounts, says the manager of Texas Auto
>> Center. Then police obtained access logs from Pay Technologies, and traced
>> the saboteur’s IP address to the suspect’s AT&T internet service, according
>> to a police affidavit filed in the case. Source: 
>> http://www.wired.com/threatlevel/2010/03/hacker-brickscars/?
>> utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+wired/index
>> +(Wired:+Index+3+(Top+Stories+2<http://www.wired.com/threatlevel/2010/03/hacker-brickscars/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+wired/index+%28Wired:+Index+3+%28Top+Stories+2>))
>>
>>
>>
>>
>>
>>
>> *Mike French
>> **Network Engineer
>> **~**EQUITY BANK <http://www.theequitybank.com/>*
>> Office: 214.231.4565
>> <[email protected]>[email protected]
>>
>> *"Evidently excellence in security by some **
>> security-centric vendors is defined as being the head of the class in a
>> room filled with children without a propensity to learn." - Anonymous*
>>
>>
>>
>>
>>
>>
>>
>>
>
>
> --
> Sherry Abercrombie
>
> "Any sufficiently advanced technology is indistinguishable from magic."
> Arthur C. Clarke
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to