Sounds like they need a good whitelisting solution ;) Feed: Schneier on Security Posted on: Wednesday, March 16, 2011 6:14 AM Author: schneier Subject: Hacking Cars with MP3 Files
Impressive research<http://www.itworld.com/security/139794/with-hacking-music-can-take-control-your-car>: By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car's stereo, this song could alter the firmware of the car's stereo system, giving attackers an entry point to change other components on the car. [http://feeds.feedburner.com/~ff/schneier/fulltext?d=2mJPEYqXBVI]<http://feeds.feedburner.com/~ff/schneier/fulltext?a=2kFjoViQ41I:5YWB0tuOKnA:2mJPEYqXBVI>[http://feeds.feedburner.com/~ff/schneier/fulltext?d=7Q72WNTAKBA]<http://feeds.feedburner.com/~ff/schneier/fulltext?a=2kFjoViQ41I:5YWB0tuOKnA:7Q72WNTAKBA>[http://feeds.feedburner.com/~ff/schneier/fulltext?d=dnMXMwOfBR0]<http://feeds.feedburner.com/~ff/schneier/fulltext?a=2kFjoViQ41I:5YWB0tuOKnA:dnMXMwOfBR0> View article...<http://www.schneier.com/blog/archives/2011/03/hacking_cars_wi.html> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
