Find or Sell Used Cars, Trucks, and SUVs in USA

2000 Cherokee Xj Sport / Lifted / Stage 5 / New Everything / Rubicon & More on 2040-cars

Year:2000 Mileage:124256 Color: Condition
Location:

Richmond, Virginia, United States

Richmond, Virginia, United States
Advertising:

Auto Services in Virginia

Virgil`s Automotive ★★★★★

Auto Repair & Service, Brake Repair
Address: 1804 N Broad St, Ewing
Phone: (423) 626-6900

Valley Collision Repair Inc ★★★★★

Auto Repair & Service, Automobile Body Repairing & Painting, Automobile Restoration-Antique & Classic
Address: 23101 Old Valley Pike, Saint-Davids-Church
Phone: (540) 459-2005

Valley Collision Repair Inc ★★★★★

Auto Repair & Service, Automobile Body Repairing & Painting, Automobile Restoration-Antique & Classic
Address: 23101 Old Valley Pike, Harrisonburg
Phone: (540) 459-2005

Transmissions of Stafford ★★★★★

Auto Repair & Service, Auto Transmission
Address: 435 Ferry Rd, Mustoe
Phone: (540) 621-0632

Tonys Auto Repair & Sale ★★★★★

Auto Repair & Service
Address: 5258 Hull Street Rd, University-Of-Richmond
Phone: (804) 233-5599

The Body Works of VA INC ★★★★★

Auto Repair & Service, Automobile Body Repairing & Painting, Automobile Parts & Supplies
Address: Round-Hill
Phone: (703) 777-5727

Auto blog

Supplier says Jeep Cherokee hack only affects FCA cars

Wed, Aug 5 2015

Harman doesn't think that drivers need to worry about any further hacks of its products. The company supplies FCA's Uconnect infotainment system where a software vulnerability is responsible for a 1.4-million vehicle recall. "This experimental hack is unique to Chrysler," Harman CEO Dinesh Paliwal said to Automotive News. "This does not exist, to our assessment, in any other vehicle." The reason that the company wouldn't be involved is that automakers aren't simply plugging in the existing infotainment systems into new vehicles. According to Paliwal, Harman supplies the unit, but FCA and other automakers are able to make additional modifications for their vehicles. The National Highway Traffic Safety Administration has also recently taken up the question of broader software vulnerabilities in Harman's products. On July 29, the agency began investigating the company to check for similarities between Uconnect and the infotainment systems supplied to other automakers. The Jeep hack became national news when two researchers were remotely able to take control of a Cherokee. The vulnerability in the cellular connection even gave control over the brakes. "Once people get in the car and get into the CAN bus, then you can start to mimic and mess up many, many things in the car," Paliwal said to Automotive News. Politicians immediately responded with legislation to create federal standards in hopes of protecting drivers better. NHTSA also opened an investigation to make sure the automaker's software update actually solved the problem. Related Video:

Autoblog Minute: FCA issues Uconnect software update amid hacking fears

Wed, Jul 29 2015

Carjacking has gone wireless, as automakers and Congress scramble for a solution after a disturbing video on Wired showed a pair of researchers controlling a Jeep Cherokee remotely. Autoblog's Adam Morath and David Gluckman report on this edition of Autoblog Minute. Show full video transcript text [00:00:00] Carjacking has gone wireless, as automakers and Congress scramble for a solution. I'm Adam Morath and this is your Autoblog Minute. Cars with wireless connections are susceptible to remote hacking, as demonstrated in a disturbing video on Wired.com. The segment showed two researchers remotely controlling a Jeep Cherokee, including running vehicle's the wipers, turning up the music, and ultimately shutting down [00:00:30] the Jeep while it was being driven on the highway by Wired senior writer Andy Greenberg. Washington took note. A press release issued from the desks of senators Ed Markey and Richard Blumenthal introduces legislation protecting drivers from auto security privacy risks. Fiat Chrysler, parent company of Jeep, has a solution for its customers. For more we go to Autoblog's David Gluckman. [GLUCKMAN INTERVIEW] Chrysler has worked with the Uconnect cellular provider Sprint to plug security holes on the carrier side. The vehicles themselves can't be updated wirelessly, so [00:01:00] the remaining changes require physical access. For that, customers have three options: One, download the Uconnect software update to a USB stick and install. Two, wait for FCA to send a USB stick with the latest software that they can install, or third, visit a dealer. Owners should do what they're most comfortable with. I made a video that walks through the whole process from download to install and it took about a half hour. [MORATH] David's full video tutorial of how to install the Uconnect fix can be seen on Autoblog. [00:01:30] It remains to be seen how the rest of the auto industry will respond to these security risks. For Autoblog, I'm Adam Morath. Related Video: Autoblog Minute is a short-form news video series reporting on all things automotive. Each segment offers a quick and clear picture of what's happening in the automotive industry from the perspective of Autoblog's expert editorial staff, auto executives, and industry professionals.

Jeep in St. Louis hacked from Pittsburgh

Tue, Jul 21 2015

One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.