The best paid proxy service which offers you both user&pass and IP authentication methods. Select the method you prefer.

Proxy Locations
US
CA
UK
FR
RU
DE
RO
NL
TR
LV
Craigslist
Facebook
Google
Pinterest
Ticketmaster
Twitter
Yahoo
Youtube and
other web sites
YOU CAN USE OUR PROXY SERVERS AT:
Money back
Guarantee

How Can The Electric Car Charging Stations Be Hacked

Posted on: June 20th, 2013

How can the electric car charging stations be hackedThe ongoing revolution in terms of vehicles and their manufacturing processes along with the increased demand of Go Green Vehicles, the concept of making Eco-friendly vehicles has become extremely popular. However, the eco-friendly electric car has also become a huge hazard for people due to the issue of hacking. Hackers can easily hack into these eco-friendly cars while they are being charged at various car charging stations.

The 20th century saw hackers concentrating their interests around nuclear power plants, breaching electricity grids and televisions which allowed the hackers to look at the viewers. However, their interests in such devices and utilities have waned ever since. Modern day hackers are more interested in electric car-charging stations which can offer them with better results than simply looking at individuals or playing with utility supplies.

According to Ofer Shefaz, the founder of OWASP Israel, a car charging station is made up of 3 main components. These are the main boards, communication equipment, RFID cards to identify the users who request for a car charge and electric components such as circuit breakers which help in preventing electrocution.

Shefaz also states that there are various ways by which hackers can hack into these electric car charging stations. Shefaz says that some of the most popular hacking techniques include –

  • Hacking by accessing the components. Linux based computers are mostly protected by a panel which can be opened with the help of a simple key. Thus, if hackers open the panel, they can gain access to the various components of the charging station such as hardware, CPU and firmware.
  • Hacking via communications. Stations have reported numerous cases of hacking where he hackers have been able to gain access to the payment details and personal information of the customer. This can be extremely harmful for customers as their secure financial details and transactions can be accessed.
  • Hacking via the RFID card. Most of the RFID cards installed at car charging stations concentrate more on the price rather than the quality. As a result, hacking them becomes extremely easy.

However, Shefaz also states that these hacking techniques are available to only a handful of people and there aren’t many people who can break complex inscription codes. Therefore, hopefully the car charging station hacking scenario should hopefully help the Hollywood scriptwriters for the time being.


You can follow any responses to this entry through the RSS 2.0 feed.

AddThis Social Bookmark Button

Leave your comment