Amazing Original Condition Timecapsule - 1979 Jeep Cherokee S 4x4 - 83k Orig Mi on 2040-cars
Lakeland, Florida, United States
Jeep Cherokee for Sale
1999 jeep cherokee classic sport utility 4-door 4.0l
Sport 4.0l 4.0l (242) smfi i6 'power tech' engine black fold away manual mirrors(US $5,334.00)
California original, 1999 jeep cherokee sport 4wd, 102k original miles, runs a++
Fwd 4dr latitude new suv automatic gasoline 3.2l v6 cyl engine granite crystal m
Fwd 4dr limited new suv automatic gasoline 2.4l 4 cyl engine granite crystal met
Jeep cherokee(US $1,300.00)
Auto Services in Florida
Zephyrhills Auto Repair ★★★★★
Yimmy`s Body Shop & Auto Repair ★★★★★
WRD Auto Tints ★★★★★
Wray`s Auto Service Inc ★★★★★
Wheaton`s Service Center ★★★★★
Waltronics Auto Care ★★★★★
Auto blog
Watch thief steal Jeep Wrangler with laptop
Thu, Jul 7 2016Advancements in technology, especially those in the automotive sector, have made cars safer, easier to drive, and harder than ever to steal. But a recent incident in Houston, TX, reveals that the latest generation of hackers and thieves knows how to use modern tech for their own nefarious devices. A car thief was caught on camera using a small computer to pilfer a 2010 Jeep Wrangler parked in its owner's driveway. The video shows a man entering the Wrangler and after a few minutes on the laptop, driving away in the vehicle. According to the Wall Street Journal, Houston police believe the same method could have been used on four other occasions involving late-model Wranglers and Cherokees. While the short clip looks like something out of a movie, this isn't the first time a Jeep has been hacked. The theft took the pair of thieves roughly 13 minutes from the time the first person opens the hood (not shown) to when the car leaves the driveway. Alarmingly, the Houston police department isn't sure what the laptop is being used for, the Journal reports. A Fiat Chrysler official told the newspaper that the thieves in the Houston incident might be using tools that only dealers have access to, which would allow them to pair another key fob to the vehicle. While that explains how they got into the vehicle, it still doesn't explain how a laptop could be used to get the vehicle running – especially when automakers ( Fiat Chrysler, Tesla, and General Motors) have altered their cars' electronics to reduce hacking. Theft rates have dropped by 96 percent since 1990, according to The New York Times, but recent events show thieves are making their own advances, prompting increased cyber protection efforts from automakers, auto-parts suppliers, and the government. It will come into focus later this month when US Transportation secretary Anthony Foxx, Lyft CEO and co-founder Logan Green, and General Motors' chairman and CEO Mary Barra speak at a cybersecurity summit in Detroit. Related Video: News Source: The Wall Street Journal, The New York Times, Business Wire, YouTube Jeep Technology SUV Off-Road Vehicles Videos viral video hacking thieves
Jeep going bigger with new Grand Wagoneer, smaller with sub-Renegade?
Tue, 11 Mar 2014The headlines are still rolling in for the new Renegade that Jeep unveiled at the Geneva Motor Show last week, but already reports are surfacing, citing sources within the company, about what Chrysler's iconic off-road brand will do next.
Speaking with Auto Express (whose reports we tend to take with a grain of salt or two), Jeep chief Mike Manley suggested that two courses of action are currently under consideration at Auburn Hills to develop two very different new models - one smaller and one larger than anything Jeep currently makes.
One plan would be to make an SUV or crossover even smaller than the new Renegade, although it isn't immediately clear what platform it would take. The Renegade (pictured above in Trailhawk spec) will be built in Italy alongside Fiat's upcoming 500X, but uses a heavily modified platform. We figure the smaller model, if approved, could base itself on the new Fiat Panda Cross.
Feds fretting over remote hack of Jeep Cherokee
Fri, Jul 24 2015A cyber-security gap that allowed for the remote hacking of a Jeep Cherokee has federal officials concerned. An associate administrator with the National Highway Traffic Safety Administration said Thursday that news of the breach conducted by researchers Chris Valasek and Charlie Miller had "floated around the entire federal government." "The Homeland Security folks sent out broadcasts that, 'Here's an issue that needs to be addressed,'" said Nathaniel Beuse, an associate administrator with the National Highway Traffic Safety Administration. Valasek and Miller commandeered remote control of the Cherokee through a security flaw in the cellular connection to the car's Uconnect infotainment system. From his Pittsburgh home, Valasek manipulated critical safety inputs, such as transmission function, on Miller's Jeep as he drove along a highway near St. Louis, MO. The scope of the remote breach is believed to be the first of its kind. The prominent cyber-security researchers needed no prior access to the vehicle to perform the hack, and the scope of the remote breach is believed to be the first of its kind. A NHTSA spokesperson said the agency's cyber-security staff members are "putting their expertise to work assessing this threat and the response, and we will take action if we determine it's necessary to protect safety." A Homeland Security spokesperson referred questions about the hack to Chrysler. Fiat Chrysler Automobiles has already been the subject of a federal hearing this month, in which officials scrutinized whether the company had adequately fixed recalled vehicles and repeatedly failed to notify the government about defects. But cyber-security concerns are a new and different species for the regulatory agency. Only hours before the Jeep hack was announced by Wired magazine earlier this week, NHTSA administrator Dr. Mark Rosekind said hacking vulnerabilities were a threat to privacy, safety, and the public's trust with new connected and autonomous technologies that allow vehicles to communicate. NHTSA outlined its response to the cyber-security challenges facing the industry in a report issued Tuesday. In it, the agency summarized its best practices for thwarting attacks and said it will analyze possible real-time infiltration responses. But the agency's ability to handle hackers may only go so far.