Find or Sell Used Cars, Trucks, and SUVs in USA

Chrysler PT Cruiser Price Analytics

About Chrysler PT Cruiser

Auto blog

Fiat Chrysler to get $105M fine from NHTSA for recall woes

Sun, Jul 26 2015

The National Highway Traffic Safety Administration is about to send a powerful message to automakers doing business in the United States, assuming reports of an upcoming $105 million fine against Fiat Chrysler Automobiles comes to fruition. In addition to the record-setting monetary fine, according to The Wall Street Journal, FCA will have to accept an independent auditor that will monitor the company's recall and safety processes and will be forced to buy back certain recalled vehicles. In other cases, such as with Jeep Grand Cherokee and Liberty models with gas tanks that could potentially catch fire in certain types of accidents, FCA will offer financial encouragement for owners to get their recall work done or to trade those older vehicles in on new cars, according to the report. FCA could reportedly reduce its fines if it meets certain conditions, though those remain unclear at this time. These actions against FCA are being taken after NHTSA began a probe into the automaker over almost two dozen separate instances where the government claims FCA failed to follow proper procedures for recalls and safety defects. Included in those safety lapses are more than 11 million vehicles currently in customer hands. These penalties and fines are separate from the investigation over security problems with Chrysler's Uconnect system that allowed hackers to obtain remote access into key vehicle systems in 1.4 million vehicles. Related Video: Image Credit: Marco Bertorello/AFP/Getty Earnings/Financials Government/Legal Recalls Chrysler Dodge Fiat Jeep RAM Safety fiat chrysler automobiles fine

Are old airbags killers?

Sat, Jul 25 2015

Takata airbags may not be the only ones with some very serious problems. A new report from TheDetroitBureau.com claims that the National Highway Traffic Safety Administration has opened its second investigation into bad airbag inflators, and this time, they aren't from Takata. The focus of this latest case is on the airbag inflators in some 500,000 older Chrysler Town and Country minivans and Kia Optima sedans, all of which come from ARC Automotive. While the Takata case looks at problems stemming from the engineering and production process, the ARC investigation focuses on the age of the inflators. As TDB explains, airbag inflators are essentially what the military refers to as shaped charges, sort of like Claymores (for fans of the Call of Duty series). In combat, they blow up in a specific direction, protecting those behind the explosion, although in the case of airbags, the explosion "[creates] a precise rush of hot gases" that inflate the bags. NHTSA's worry is that with the increased average age of today's vehicles, years and years of being bounced, jolted, and shaken about and exposed to often-radical temperature changes have altered the nature of the explosives in these vehicles, causing too big of an explosion. "It may be a reasonable assumption that as these things age they deteriorate." – Analyst George Peterson "It may be a reasonable assumption that as these things age they deteriorate," analyst George Peterson told TheDetroitBureau.com. NHTSA boss Mark Rosekind backed up aging angle. "Cars are lasting on the road a lot longer than ever before," Rosekind told TDB, adding that seals could start breaking down. "Is aging now an issue? That's part of the investigation going on." NHTSA has only identified two "incidents" so far, although according to Center for Auto Safety Director Clarence Ditlow, there's genuine concern that there could be additional unidentified cases. "Could we have missed more? That could be the case," Ditlow told TDB, citing the misidentified deaths in the Takata investigation. Ditlow was quick to point out that, even in older vehicles, airbags are much more likely to protect than harm. "No one is saying you should disable your airbags," the safety advocate told TDB. "You're far more likely to be helped than hurt by one if they go off." At least one automaker, meanwhile, has already been advised of the investigation by NHTSA and is checking its airbags.

How to update and secure a vulnerable Chrysler Uconnect system

Sat, Jul 25 2015

If you own one of the 1.4 million vehicles affected by the recent Chrysler software recall, you may want to watch this video. In it, we explain how to get the latest infotainment software loaded onto the 8.4-inch Uconnect system. The recall was a response to the findings of researchers who were able to hack into and remotely control a 2014 Jeep Cherokee through its cellular connection. Although Fiat Chrysler has worked with Sprint to plug most of the holes on the carrier side, there are still some vulnerabilities that only this latest software version can patch. Owners have three options to get the update: download it now, wait for a USB stick in the mail, or take the vehicle to an FCA dealer. Chrysler will be sending USB sticks loaded with the software update to customers. Anyone with an internet connection and a USB stick of their own with at least 4 GB capacity can speed things up by downloading the patch from the Uconnect website. We cover that process from start to finish in the video, with the final portion still applicable to those using the FCA-supplied USB stick. If after watching this you still don't want to tackle the patch yourself, you can take your vehicle to the dealer to have it done. Also note that this process is the same for all Uconnect updates, not just the one patching the exploits. Our demonstrator vehicle is a 2015 Ram 1500 pickup. The procedure should be very similar on other products with the 8.4-inch Uconnect system, with only the location of the USB port varying. Once you have the USB stick with the software on it – either after having downloaded it yourself or receiving it in the mail from Chrysler – the installation process is relatively simple. It takes about 15 minutes to perform the update; we edited out the wait in the video. To check whether or not your car's 8.4-inch Uconnect system is running the latest software, go to System Information on the touch screen's Settings page and look at Software Version. The update related to the recall is version 15.17.5. Related Video: Recalls Chrysler Dodge Jeep RAM Safety Technology Infotainment Videos Original Video hacking

Harsh words from senators over Chrysler's delay in reporting hack

Fri, Jul 24 2015

The federal agency charged with protecting American motorists wants to know more about how hackers remotely commandeered and controlled a Jeep Cherokee. Hours after Fiat Chrysler Automobiles recalled 1.4 million cars affected by a flaw in their cellular connections, officials with the National Highway Traffic Safety Administration said Friday they'll further probe the defect by conducting a formal recall query investigation. "Opening this investigation will allow NHTSA to better assess the effectiveness of the remedy proposed," the agency said in a written statement. The remedy works, said Chris Valasek, one of the researchers who first discovered the security flaw. After testing for the vulnerability again Friday, he wrote on Twitter: "Looks like I can't get to @0xcharlie's Jeep from my house via my phone. Good job FCA/Sprint!" From his Pittsburgh home, Valasek had previously accessed and controlled co-worker Charlie Miller's Jeep along a St. Louis highway. Researchers have demonstrated remote hacks before, but the scope and severity of the Jeep vulnerability was unprecedented. The recall for a cyber threat was the first of its kind. Although a software patch and changes made by cellular provider Sprint appeared to fix the problem, news of the exploit and Chrysler's response brought a fresh round of consternation on Capitol Hill, where federal lawmakers had already expressed concerns about automotive cyber security. The Jeep hack elevated their concerns to a new level. "Cyber threats in cars are real and urgent, no figment of the imagination, as this huge recall demonstrates," said Sen. Richard Blumenthal (D-CT). "Incredibly, Chrysler delayed disclosing this chilling cyber-security danger egregiously and inexcusably, and strong sanctions are appropriate to send a message that other auto manufacturers will heed." Chrysler had known about the security gap since October, and Sen. Ed Markey (D-MA) wondered why it took the company so long to let customers know they were at risk. "Despite knowing about this security gap for nearly nine months, Chrysler is only now recalling 1.4 million vehicles to fix this vulnerability," he said. That's a potential pitfall for Chrysler, and something NHTSA will likely address in its investigation. Automakers are supposed to report safety-related defects to the agency within five days of discovery. But according to a chronology of events Chrysler submitted in its recall paperwork, it didn't inform NHTSA until July 15.

FCA issuing software update for 1.4M vehicles to prevent hacking

Fri, Jul 24 2015

In the wake of a Jeep Cherokee being hacked remotely while on the road through its Uconnect infotainment system, FCA US is now issuing a software update for 1.4 million vehicles in the United States. Affected customers will receive a USB stick in the mail with the improved version; owners can check this website to see if their cars are affected. A large variety of models with FCA's 8.4-inch touchscreen infotainment system are affected. They include the 2015 Chrysler 200, 2015 Chrysler 300, 2015 Dodge Charger, and 2015 Dodge Challenger; 2013-2015 Dodge Viper; 2013-2015 Ram 1500, 2500, and 3500; 2013-2015 Ram 3500, 4500, and 5500 chassis cab; 2014-2015 Jeep Grand Cherokee and Cherokee; and 2014-2015 Dodge Durango. According to FCA in its announcement, the new software "insulates connected vehicles from remote manipulation." As of July 23, the company also "fully tested and implemented within the cellular network" additional security to prevent access to many of a vehicle's systems. FCA US says that it's conducting this campaign out of an abundance of caution and disputes the notion that there's a defect with these vehicles. Beyond the demonstration of the hack in the Cherokee, the automaker says that it's unaware of any other reports of these attacks actually happening. Related Video: Statement: Software Update July 24, 2015 , Auburn Hills, Mich. - FCA US LLC is conducting a voluntary safety recall to update software in approximately 1,400,000 U.S. vehicles equipped with certain radios. The recall aligns with an ongoing software distribution that insulates connected vehicles from remote manipulation, which, if unauthorized, constitutes criminal action. Further, FCA US has applied network-level security measures to prevent the type of remote manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems and were fully tested and implemented within the cellular network on July 23, 2015. The Company is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents – independent of the media demonstration.

Feds fretting over remote hack of Jeep Cherokee

Fri, Jul 24 2015

A cyber-security gap that allowed for the remote hacking of a Jeep Cherokee has federal officials concerned. An associate administrator with the National Highway Traffic Safety Administration said Thursday that news of the breach conducted by researchers Chris Valasek and Charlie Miller had "floated around the entire federal government." "The Homeland Security folks sent out broadcasts that, 'Here's an issue that needs to be addressed,'" said Nathaniel Beuse, an associate administrator with the National Highway Traffic Safety Administration. Valasek and Miller commandeered remote control of the Cherokee through a security flaw in the cellular connection to the car's Uconnect infotainment system. From his Pittsburgh home, Valasek manipulated critical safety inputs, such as transmission function, on Miller's Jeep as he drove along a highway near St. Louis, MO. The scope of the remote breach is believed to be the first of its kind. The prominent cyber-security researchers needed no prior access to the vehicle to perform the hack, and the scope of the remote breach is believed to be the first of its kind. A NHTSA spokesperson said the agency's cyber-security staff members are "putting their expertise to work assessing this threat and the response, and we will take action if we determine it's necessary to protect safety." A Homeland Security spokesperson referred questions about the hack to Chrysler. Fiat Chrysler Automobiles has already been the subject of a federal hearing this month, in which officials scrutinized whether the company had adequately fixed recalled vehicles and repeatedly failed to notify the government about defects. But cyber-security concerns are a new and different species for the regulatory agency. Only hours before the Jeep hack was announced by Wired magazine earlier this week, NHTSA administrator Dr. Mark Rosekind said hacking vulnerabilities were a threat to privacy, safety, and the public's trust with new connected and autonomous technologies that allow vehicles to communicate. NHTSA outlined its response to the cyber-security challenges facing the industry in a report issued Tuesday. In it, the agency summarized its best practices for thwarting attacks and said it will analyze possible real-time infiltration responses. But the agency's ability to handle hackers may only go so far.

Ferrari officially files SEC paperwork to register future IPO

Thu, Jul 23 2015

Late last year FCA announced plans to spin off Ferrari into a separate company, and after a long wait that process has finally become official. The Prancing Horse has now filed the necessary prospectus and other documents with the Securities and Exchange Commission to hold an initial public offering on The New York Stock Exchange. The paperwork doesn't mention a specific date for the Italian sportscar maker's IPO, but it's expected sometime in October. At this point, the documents also don't include some other vital data about the IPO. Ferrari lists neither the number of shares being offered nor their price. The company also doesn't have a stock symbol yet. UBS, BofA Merrill Lynch and Santander are acting as joint book runners for the deal. As part of the IPO, FCA initially intends to sell 10 percent of Ferrari's shares on the stock market. Another 10 percent of the company still belongs to Piero Ferrari. FCA is holding onto the remaining 80 percent in the short term for financial reasons but intends to distribute them to shareholders in early 2016. After the spin-off, about 24 percent of Ferrari would be owned by Exor, 10 percent by Piero Ferrari, and 66 percent by public shareholders, according to the SEC documents. FCA boss Sergio Marchionne believes that Ferrari could be worth over $11 billion. Although, his estimate might be slightly high. According to Reuters, Wall Street is actually putting the value somewhere between $5.5 billion and $11 billion. If you're thinking about investing in the company or just want to read the nitty-gritty about the brand's financial health, the entire SEC filing can be read here. Ferrari Files for Initial Public Offering LONDON, July 23, 2015 /PRNewswire/ -- Fiat Chrysler Automobiles N.V. ("FCA") announced today that its subsidiary, New Business Netherlands N.V. (to be renamed Ferrari N.V.), has filed a registration statement on Form F-1 with the U.S. Securities and Exchange Commission ("SEC") for a proposed initial public offering of common shares currently held by FCA. The number of common shares to be offered and the price range for the proposed offering have not yet been determined, although the proposed offering is not expected to exceed 10% of the outstanding common shares. In connection with the initial public offering, Ferrari intends to apply to list its common shares on the New York Stock Exchange.

Car Club USA: Chrysler Power Classic

Wed, Jul 22 2015

Car Club USA heads to the Buckeye State for some high-octane drag racing at the Chrysler Power Classic. And for these amateur drag racers, nothing but Mopar muscle will do. "I would say Mopar is kind of a way of life," says Larry Augenstine. "Some people get addicted to lemonade, or beer, [or] drugs. Well, I'm Mopars." Larry drives a 1968 Plymouth Barracuda with a 426 Hemi motor that once belonged to local racing legend Ray Christian. He's joined at the track by Mark Ipsen of the Midwest Nostalgia Pro Stock Association. Mark runs a 1979 AMC Concord with a modified 401 block V8 that he claims has dynoed at just under 1,000 horsepower. The biggest threat to any day on track is Mother Nature, who cast a threatening shadow over National Trail Raceway for much of the event. When the clouds and rain subsided, our cameras captured the grounds crew in action with blowers, torches, and a sticky compound that's sprayed the entire length of the track. Can Larry, Mark, and the rest of these Mopar fanatics make the most of the few runs they'll get? Stay tuned to find out. Each Car Club USA episode features a different car club or event from across the US, where passionate owner communities gather to share automotive experiences and embark on incredible adventures. From Main Street cruises to off-road trails, catch all the latest car club activity on Autoblog. Chrysler Racing Vehicles Performance Car Club USA Videos Original Video autoblog black

Apple picks up former FCA quality boss Doug Betts

Wed, Jul 22 2015

Apple made a significant personnel move that further signals its entry into the automotive world, hiring former Fiat Chrysler executive Doug Betts for an unspecified role. The information was obtained by The Wall Street Journal, which cites Betts' LinkedIn page. His career included stints at Toyota and Nissan before joining Chrysler Group (now FCA US LLC) in 2007, although his time there didn't end well. He left FCA, where he served as the automaker's head of quality, after the company's dismal showing in Consumer Reports' 2014 Annual Auto Reliability Survey. According to Betts' LinkedIn profile, which has since been pulled down, his job title reads "Operations – Apple Inc" in the San Francisco Bay area. Apple, meanwhile, was unwilling to divulge anything to the WSJ, although there's plenty to infer based on the hire. Betts wasn't the only big auto-related hire. According to the WSJ, Cupertino also lured an unnamed but "leading" autonomous vehicle researcher from Europe, who will be part of a team being setup to study driverless systems. Related Video:

Jeep in St. Louis hacked from Pittsburgh

Tue, Jul 21 2015

One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.