In recent years, as cars become more intelligent and networked, a series of new control methods such as intelligent navigation, automatic driving, and remote control are becoming more mature, and the car has become a veritable "computer on wheels." But what followed was the increase in the number of “car hackers” because of the flaws in any technology and the increasing importance of car safety.
However, there are a large number of "white hat" hackers in this group. While protecting the security of intelligent systems, some auto manufacturers at home and abroad have also invited hackers to "check" the safety of automobiles. Car hackers can destroy cars and save cars. The following is a report by Titanic Media reporter Song Changle:
Three months ago, famous American hackers Charlie Miller and Chris Wallacek used the in-vehicle information service system "UConnect" to successfully invade a Jeep Cherokee on the highway ten miles away, causing the car to travel. Failure, turned into the ditch.
This incident means officially bringing the threat of hackers to the life level. After that, Chrysler announced the recall of about 1.4 million cars with software vulnerabilities, the first car manufacturer to recall cars because of hacking risks.
In fact, because the computing and networking systems used in cars follow the existing computing and networking architectures, and inherit the natural security flaws of these systems, the automotive industry is facing an increasingly difficult information security situation in the PC and Internet sectors. Attacks, security breaches, car cracking and hijacking are often associated with cars. Especially in the past two years, there have been many incidents of car safety breaches:
In July 2014, 360 announced the discovery of a defect in the Tesla application. The attacker could use this vulnerability to remotely control the vehicle, unlocking, whistling, flashing, and opening the sunroof.
In February 2015, the US General Motors OnStar system was exposed to security vulnerabilities, and hackers could use it to remotely control the car;
In June 2015, the Wuyun vulnerability platform and the 360-filled vulnerability platform had exposed serious security vulnerabilities in BYD cloud services. Vehicles could be completely controlled by hackers, and BYD officially confirmed the existence of vulnerabilities.
......
The above is just a part of what we know. The Internet of Vehicles does not stop evolving, and the technical safety accidents of automobiles will inevitably repeat itself. Frequent security breaches and hacking incidents are a wake-up call: car information system security is directly affecting car safety and endangering public safety, personal and property safety.
Zheng Wenbin, chief engineer of 360 Company and head of the vulnerability lab team, told Titan Media that car safety is different from previous PC and handheld devices, but there will be an intersection. “Most of the current car brands are unique systems, especially the control system is basically traditional, but in the future it will move closer to the general-purpose system of handheld devices. As long as it is connected with Android and iOS systems, the risk of cars will increase” He told the Titanium media like this.
Zheng Wenbin also said that Java claims that there are currently 4 billion devices in operation worldwide. If a vulnerability is discovered, hackers will have the opportunity to attack the 4 billion devices. The same is true for cars. The safety level and the hazard of loading the same system are the same. If the city gate is in a fire, it will surely catch the fish.
In the era of mobile internet, security has broken through the boundaries of software, content, and services. Traditional security protection ideas have been unable to solve real security problems.
So, does this mean that as long as it is a smart networked thing, it is full of loopholes in the eyes of hackers? What can we do? Especially for car safety related to our lives?
Not long ago, at the 2015 SyScan360 International Foresight Information Security Conference, the two hackers who invaded Jeep Cherokee, Charlie Miller and Chris Wallacek, gave us a way of thinking.
They call themselves "white hat" hackers and will not take the initiative to attack other people's cars, but will continue to study the safety of cars. In their view, the invasion of Jeep Cherokee is an example of a hacker who can influence the real world. They hope that with this incident, car manufacturers equipped with smart devices will pay enough attention to safety, so that car manufacturers will be safe. Put more effort into it.
This just proves that the cooperation between network hackers and security talents and car-related manufacturers is becoming an important development direction to ensure the security of the car network. In September of this year, Uber hired Charlie Miller and Chris Varasek to announce that it would create a world-class security program for Uber Automated Driving.
In addition, according to the titanium media, some automakers at home and abroad have also invited hackers to “check” for car safety. For example, the Canadian military contract includes hacking analysis of the light pickup truck system in 2015. The contract clearly states that hackers must identify the loopholes and show how the car was hacked.
In this way, if the system vulnerability can be discovered in advance and repaired in time, then the hacker who is willing to do bad things can not use this vulnerability to damage the interests of the enterprise and the user.
"However, even if you can take the initiative to defend and avoid loopholes, you can't block hackers' attacks. It's a game process when you come and go with the virus makers." Zheng Wenbin does not hide his concerns about car safety. . Zheng Wenbin also mentioned that there is another important reason for the safety hazard of the Internet of Vehicles. The industry's in-vehicle intelligent systems and intelligent hardware are emerging one after another, but no standard has been established.
We know that Google and Apple have launched Android Auto and CarPlay, both of which are preparing for a large-scale promotion, trying to bring a safe and friendly mobile experience to users' cars. Although we have made some progress abroad, we are worried about the domestic market environment. In the entire automotive market, an organization is needed to promote the unification of the automotive system and solve potential safety hazards.
Last year, the American Automobile Manufacturers Association (AAA) reached an agreement for the first time to develop a privacy protection policy against hackers. It is expected that by the end of this year, led by the American Automobile Manufacturers Association and the Global Automobile Manufacturers Association, a number of US auto manufacturers will jointly set up an Information Sharing and Analysis Center (ISAC) to jointly combat car hacking.
At home, we have also seen the emergence of such an institution. Recently, 360 President Qi Xiangdong revealed that 360 is currently cooperating with a number of institutions and car companies to prepare for the establishment of the China Car Network Security Alliance. It wants to bring together the cyber security capabilities of the whole society to jointly face and solve the car's information system security, absorb and help. Third-party security researchers are involved in the research and resolution of automotive information system security issues.
However, even with the promotion of the industry, as a user of the intelligent era, we must cultivate a sense of independent security. If we lost personal privacy and some property in the cloud before, then with the arrival of the era of the Internet of Vehicles, we should learn to be responsible for our own lives.

Pet Treats Molding Machine


DM-268 Pet Treats Molding Machine is special machinery for producing pet snacks. With such machine, various lovely shapes can be made like frog, crocodile, bone, pork ears, barrel, etc. People usually give it as an ideal encouragement to dogs and cats while they learn a new action or do well in some exercises and games. Also, we can provide different recipes to meet various market demands. It has the following features:

a) DM-268 Pet Treats Molding Machine comes with user-friendly microprocessor controller with these following features.

b) Equipped with servo motor to realize higher efficiency and lower consumption.

c) Dust, oil proof and colorful touch switch control panel.

d) El display of pressure, speed, time and distance for each motion.

e) Shut-down device with 100 presets mold data memory.

f) PID barrel temperature control: temperature abnormal & electrical wire breaking alarm.

g) SSR-solid state temperature controller.

h) Screw cold start protection.

i) Abnormal shot detection.

j) Output quantity and packaging quantity preset.

k) Clamping, injection and ejection, and carriage action (option) by touch screen.

l) Screw rotating speed read-out.

m) Security code function to avoid missing data or careless changing.

n) Multi-safety protection to operator.


pet treat molding machine

Pet Treats Molding Machine,Pet Treat Molding Machine,Dog Treat Molding Machine,Dog Chewing Bone Molding Machine

Jinan Darin Machinery Co., Ltd. , https://www.globaldarin.com