Hackers are the internet's immune system.

Keren Elazari
August 06, 2015

Keren Elazari

Cyber Security Analyst, Author & Researcher
TED Top 10 Consulting Newsmakers

There is a spotlight on cybersecurity like there hasn’t been in quite a while. Report after report streams into the public eye about the vulnerability of embedded health devices (such as pacemakers) as well as wifi-connected appliances, thermostats, security cameras, smart rifles...and even skateboards. The most well-known example and catalyst of public interest on this subject is Charlie Miller and Chris Valasek’s Jeep UConnect exploit. In a nutshell, the security researchers remotely hacked a Jeep Cherokee and eventually sent into a ditch…with their test subject inside attempting to maintain control of the vehicle. Don’t worry; he lived. Here’s what they found:

  • They were able to hack the Jeep Cherokee via internet connection from a basement 10 miles away while it was operating on the highway. 
  • They were able to gain control over everything from the air vents, radio, brakes, dashboard, steering wheel and even blurred the windshield of the Jeep with wiper fluid. 
  • They were able to control and disable the speed of the Jeep. 
  • The Jeep Cherokee, Cadillac Escalade and Infiniti Q50 were ranked first, second and third-most vulnerable vehicles, respectively.

"All of this is possible only because Chrysler, like practically all car makers, is doing its best to turn the modern automobile into a smartphone. Uconnect, an Internet-connected computer feature in hundreds of thousands of Fiat Chrysler cars, SUVs, and trucks, controls the vehicle’s entertainment and navigation, enables phone calls, and even offers a Wi-Fi hot spot. And thanks to one vulnerable element, which Miller and Valasek won’t identify until their Black Hat talk, Uconnect’s cellular connection also lets anyone who knows the car’s IP address gain access from anywhere in the country. “From an attacker’s perspective, it’s a super nice vulnerability,” - Charlie Miller

These vulnerabilities have obviously shaken both the auto industry and consumers’ previous knowledge and beliefs of cybersecurity. There is now a new dimension to the caveat of introducing internet connectivity to everyday devices. Over 400,000 different car models are now being considered vulnerable, and car makers and law makers are working towards increasing defense against such attacks. Despite how troubling it is when vulnerabilities like this are discovered, cybersecurity and security technologies expert Keren Elazari believes that we need hackers. Keren is a key member of the Israeli Cyber Security Industry and has shared her expertise with government organizations and Fortune 500 companies for over fourteen years. She is also a highly sought after keynote speaker who has given presentations for Google, Microsoft, CITI Group, and DefCon about the duty hackers have to use their talents ethically. In 2014, she received the highly prestigious opportunity to speak at a TED conference for the first time. Since then, her advocacy for the positive potential of hackers has captured the attention of over a million viewers. Her perspective on this matter is a clear, concise message:

We need ethical hackers in order to locate and exploit vulnerabilities before those vulnerabilities are located and exploited by the wrong people. 


Want to know more about Keren? Check out her bio, videos, reviews & more here

Keren Elazari

Want Keren Elazari for your next event?

Find out more information, including fees and availability.
Find Out More
Keep Reading
Cyber Warfare in context of global conflicts
Keren Elazari
Keren Elazari
March 16, 2022
In the Age of Cyber Warfare, states and corporations alike have redrawn the battle lines, and ...
PAST: Keren Elazari | 5/14
Keren Elazari
Keren Elazari
May 14, 2021
About Keren Elazari is an internationally recognized security analyst, researcher, author, and ...
Where Are All The Women ?
Keren Elazari
Keren Elazari
September 08, 2015
People talk about the lack of gender diversity and representation at conferences and media events. I often hear - ...
Cyber Warfare in context of global conflicts
In the Age of Cyber Warfare, states and corporations alike have redrawn the battle lines, and they are now virtual. This era began roughly 10 years ago, a computer virus called Stuxnet - changed the rules of the game. Stuxnet was the world's first cyber weapon: computer code capable of disrupting physical facilities. An epic project, estimated t...
Read More
PAST: Keren Elazari | 5/14
About Keren Elazari is an internationally recognized security analyst, researcher, author, and speaker. Since 2000, Keren has worked with leading Israeli security firms, government organizations, Global Big 4, and Fortune 500 companies. Keren covers emerging security technologies as an independent strategic analyst and advisor. In 2014, Keren b...
Read More
Where Are All The Women ?
People talk about the lack of gender diversity and representation at conferences and media events. I often hear - "We tried, but couldn't get any" - or even worse "we don't think it's a problem" (True story!) Or : "what about all of the other under-represented groups?" Fair enough : There are a lot of minorities which don't get the limelight. Ho...
Read More
Hackers are the internet's immune system.
There is a spotlight on cybersecurity like there hasn't been in quite a while. Report after report streams into the public eye about the vulnerability of embedded health devices (such as pacemakers) as well as wifi-connected appliances, thermostats, security cameras, smart rifles...and even skateboards. The most well-known example and catalyst...
Read More
TED | Keren Elazari Q&A
Two weeks ago, hours after Turkish prime minister Recep Tayyip Erdo?an vowed to "wipe out"; Twitter, his government blocked access to the platform across the country. It was just weeks before a hotly contended election, and Erdo?an was upset about tweets accusing him of corruption. A judicial ruling in Turkey called for Twitter to take down th...
Read More