Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Car Hacker Charlie Miller Leaves Twitter

The famous researcher Charlie Miller announced early on Tuesday that he is leaving the security team of the social media giant Twitter.

The announcement — made on Twitter, of course — reveals only that Miller will be stepping down effective Friday.

The famous researcher Charlie Miller announced early on Tuesday that he is leaving the security team of the social media giant Twitter.

The announcement — made on Twitter, of course — reveals only that Miller will be stepping down effective Friday.

The security expert, hired by Twitter in September 2012, hasn’t said why he is leaving the company, or what he plans on doing next. However, considering that his latest research focused on hacking connected vehicles, some speculate that he might have been recruited by a car maker.

A few years ago, Miller was best known for finding critical zero-day vulnerabilities in Apple products. The researcher, who spent five years working for the NSA, made a lot of headlines in 2011 after he publicly disclosed a flaw in Apple’s App Store, and Apple responded by revoking his developer license.

More recently, Miller made the news after hacking cars with Chris Valasek, director of vehicle security research for IOActive. Miller joined IOActive’s advisory board in December 2014.

Miller and Valasek started hacking cars in 2013 when they took control of numerous functions on a Toyota Prius. This year, they demonstrated that automobiles can also be hacked remotely when they hijacked a Jeep through Fiat Chrysler’s Uconnect feature. The experts managed to kill the engine, turn on the air conditioning, hijack the infotainment system, track the vehicle via GPS, disable the brakes, and even take control of the steering.

Advertisement. Scroll to continue reading.

The demonstration led the car maker to recall 1.4 million vehicles in order to update their software.

While it’s unclear where Miller is going next, one thing is certain: he is not going back to the NSA.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem