·The hacker car company has been robbing BYD "cloud service" for 2 minutes

Hackers have become a group of madmen who have been frustrated by car manufacturers. They have now opened a "group" mode for cars, invading many car-mounted computers and car networking systems, causing vehicles to completely stop listening to the owner’s commands, automatically launching and playing music. Out of control, etc. At the end of June, two technical bursels went to the "too idle" American hackers to invade the JEEP free light, and the free light "tired and not love" global recalled a round. The hacker is launching the most severe test of the history of the car safety system.
Feature Paper/Guangzhou Daily reporter Deng Litu/Profile picture Many car companies recruited BYD “Cloud Service” 2 minutes was broken at the launch ceremony of HackPWN 2015 in June, security experts used the discovered BYD car cloud service platform vulnerability, no key In the case of the successful use of the computer has realized remote unlocking, whistling, flashing lights, opening the sunroof and other manipulations, from the start of operation to successful cracking, it took less than 2 minutes. It is reported that the BYD security vulnerability used in this time exists in the BYD cloud service system, which will affect the BYD hybrid vehicles Qin, Si Rui, S7 and the latest Tang and other vehicles equipped with BYD cloud services.
JEEP is remotely controlled and out of control Two white-hat hackers (hackers who have pointed out software vulnerabilities to help improve) have found that Fiat Chrysler's Jeep Free Light models may be controlled by remote attacks. In order to repair these software failures, Fiat announced the recall of 1.4 million vehicles, which is the first time in the automotive industry to recall vehicles due to hacker attacks.
· Universal Anji Star OnStar Vulnerability Recently, GM's Anji Star OnStar vulnerability has attracted much attention. The hacker can remotely unlock and control the vehicle and start the engine through the interception of the mobile APP software and OnStar server communication. This vulnerability involves GM Cadillac, BAK, Chevrolet. Three major brands. Although it does not cause the vehicle to get out of control, its loopholes also cause the owner to worry about the safety of the vehicle.
· BMW Internet of Vehicles was breached. In February of this year, the BMW Connected Drive car network digital service system revealed flaws in security. In just a few minutes, hackers could invade the interior of the vehicle remotely and open the door. The defect involves the BMW Group's BMW, MINI and Rolls-Royce brands, and approximately 2.2 million vehicles equipped with the ConnectedDrive digital service system are affected.
Phenomenon chain fermentation: car technology is not safe. Of course, the JEEP free light car computer "blacked out" incident is not so simple as the Fick Group's models, hackers through the loopholes to remotely control the car's entertainment system and many other key functions. For example, NHTSA estimates on its official website that about 2.8 million cars equipped with the Kardon entertainment system will be affected, and said that Harman has been investigated since July 29.
According to Harman's official news, its Kardon system customers include BMW, Subaru and Mercedes. To this end, industry insiders question whether BMW, Audi and Mercedes-Benz's technological advances in the field of vehicle network security can cope with hacker attacks. Mercedes-Benz, BMW and Audi all said that the network used in each function of the car is separate, such as the radio network, voice and braking system are separated by a firewall and security and virus scanner. Daimler spokesperson Benjamin Oberkersch said recently: "The 100% safety of the vehicle system does not exist, but we are improving the system, testing it by external and internal experts, and therefore the latest technology."
Rainer Scholz, a telecommunications and mobile communications analyst from EY Consulting, a foreign company, expressed doubts. He believes that car technology is becoming more and more complex and it is impossible to avoid hacking. "We really doubt whether the car companies can keep up with the development of advanced technology, especially the development of hacking technology." Experts said that hackers can use the connection of mobile phones and car entertainment systems to gain access to other systems.
It is reported that the sound body is connected to an electronic control unit (ECU), and a car has 200 electronic control units.
Observing hackers are challenging car safety. The HackPwn2015 security geek carnival was held at the end of August this year. It is a global hacker carnival focused on smart life security. It is open to all white-hat hackers, and invites white-hat hackers who are interested in “cracking” to explore the market. The security vulnerabilities of smart devices and intelligent systems are used to promote the industry's common concern and participate in the security protection of the Internet of Everything era. Fortunately, white-hat hackers are "goodwill", but in the future, the industry is more worried about the malicious attacks of black hat hackers.
At the Black Hat Conference held this year, several hackers enthusiastically demonstrated how to "attack" cars, except that JEEP's free light was used as a "target" for the demo, and the other came from mobile. Security startup executives also showed how he and his friends hacked Tesla cars. In addition, a developer also showed how he unlocked the car wirelessly, regardless of the owner of the car. Undoubtedly, the car's information system has become a safety weakness.
In fact, it is not accidental that hackers "group" cars, but cars are more important to humans, and car safety is especially important. In particular, the in-car entertainment networking system began to provide more and more private customized services, such as Weibo, looking for nearby restaurants, gas stations, parking lots, etc., so that more personal data of the owners were leaked. To this end, US Senators Edward and Richard have already submitted a legislative proposal to the federal government to require the government to establish safety standards to ensure that cars will not be attacked by cyber attacks. The United States is the first country in the world to legislate for car network security proposals.
The reporter observed that "anti-black" is a difficult problem for car companies. By 2020, about 90% of new cars will be able to connect. Experts predict that as cars become connected to each other, cars become increasingly insecure. What's more, "now hackers want to invade a car, no need to enter the entire car, as long as they invade individual components such as entertainment consoles, they can succeed." Domestic security expert Liu Jianwei said. Although the process of hacking to crack the car system is only a few minutes or even a few seconds, it is actually a process of discovery and research after weeks or even months. Car safety and life are closely related, so car safety is more serious than other network security issues, and should be paid more attention and attention.
For JEEP to fix vulnerabilities by patching, international security experts and industry analysts believe that cracking through security vulnerabilities and building firewalls to block hackers is the wrong strategy and will eventually prove to be ineffective. They believe that there is no completely safe way to communicate with computers. Building a firewall takes a considerable amount of time and is difficult to break. Car companies must establish computer systems to identify security breaches and prevent attacks.

Electric Counter Balance Forklift

Zowell electric counterbalance forklift is a material handling for both indoor and outdoor use. The fork is set outside the center line of front wheel. With the counterbalance installed at the tail, this forklift can easily offset the weight of goods. The counter balanced forklift equipped with pneumatic tire to ensure operation speed and gradeability. It is widely used in loading, unloading, stacking and transporting finished goods in ports, stations and factory. Counterweight forklift within 3 tons can also operate in cabins, train compartments and containers.

Safe, efficiency, comfortable, no pollution are key features and targets of Zowell counter balanced forklift as well as other products. Ergonomical design on rear-position multi-valve and bias layout of instrument panel, makes operation safer. The ultra-low torque steering system greatly improves the reliability of steering. Besides, full range of customized attachment choices such as side shift, fork positioner, bale clamp, stabilizers, full closed cabin and heater can also be added into solid and scalable body.

The load capacity of FE counterbalanced forklifts ranges from 1500kg to 3500kg. The maximum lift height is 6000mm. If you have bigger load capacity or other need, please contact us for a professional help.

FE counter balanced forklift1

Lonking forklift, Linde forklift,Big material handling, port goods transport

Suzhou Pioneer Material Handling Equipment & Technology Co., Ltd , https://www.zowellforklift.com