Hacked GPS Apps Could Cause Traffic Jams: Report
A new study has found that hackers have the ability to cause real-time traffic jams, even in areas many miles from their location. The threat could affect the millions of people who rely on global positioning systems.
Among the most prolific systems targeted by hackers is Google Maps, a service that offers turn-by-turn navigation using information from a mobile phone to analyze real-time traffic data.
All location information sent to the individual is secured by a TLS (Transport Layer Security) system to protect the integrity of the data and make it impossible for a hacker to orchestrate an attack before being detected by Google. (Source: computerworld.com)
But according to Tobias Jeske, a doctoral student at the Institute for Security in Distributed Applications at the Hamburg University of Technology, TLS is powerless if a hacker attacks before the TLS system can be initiated.
Man-In-The-Middle Attack Determines Vulnerability
To demonstrate his theory, Jeske performed a man-in-the-middle attack on an Android 4.0.4 smartphone. In a nutshell, a man-in-the-middle attack is a form of eavesdropping whereby a hacker relays messages between legitimate machines (such as computers and mobile devices).
And while it would appear as if information is being transmitted via a private connection, in actuality all communications between the machines is being controlled by the hacker.
Following his experiment, Jeske discovered that the attacker can send false information without detection.
However, it was determined that for a hacker to really influence traffic flow in a given area, a substantial number of Google Maps users need to be using the service at about the same time and heading towards the same area.
Nevertheless, it is still unnerving that an individual is able to send out false traffic information without the fear of detection.
Fresh Updates Could Combat Problems
Security experts say that firms will need to adjust to the threat by protecting their systems with advanced security measures.
For example, software firms that produce navigation apps can prevent problems by linking location information to a one-time authentication system that is time stamped and limited to a fixed amount of time.
In other words, these companies would need to indicate when their information was posted and be mindful to constantly update traffic status in these areas. (Source: networkworld.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.