1977 Chrysler New Yorker Brougham on 2040-cars
Stoughton, Wisconsin, United States
Body Type:Sedan
Engine:V8
Vehicle Title:Clear
For Sale By:Private Seller
Interior Color: Burgundy
Make: Chrysler
Number of Cylinders: 8
Model: New Yorker
Trim: BROUGHAM
Warranty: Vehicle does NOT have an existing warranty
Drive Type: AUTOMATIC
Mileage: 44,156
Power Options: Air Conditioning, Power Locks, Power Windows, Power Seats
Exterior Color: Burgundy
CLEAN, LOW MILE CLASSIC.
Chrysler New Yorker for Sale
- 1962 chrysler new yorker all original paint, interior, drive train mint original(US $13,900.00)
- No reserve auction 51,000 miles new yorker classic mark cross mopar clean
- 1967 chrysler new yorker one owner 31,000 miles no reserve
- 1991 chrysler new yorker fifth avenue sedan 4-door 3.3l(US $3,895.00)
- 1962 chrysler new yorker sedan low mileage unrestored driver(US $4,500.00)
- 1942 chrysler new yorker luxury 2-door coupe 6 passenger - rare
Auto Services in Wisconsin
Wrenches Automotive ★★★★★
West Central Auto Inc ★★★★★
Van Horn Dodge ★★★★★
Tri City Hyundai ★★★★★
Tarkus Complete Automotive Service ★★★★★
South Central Wisconsin Auto Glass Repair ★★★★★
Auto blog
Supplier says Jeep Cherokee hack only affects FCA cars
Wed, Aug 5 2015Harman doesn't think that drivers need to worry about any further hacks of its products. The company supplies FCA's Uconnect infotainment system where a software vulnerability is responsible for a 1.4-million vehicle recall. "This experimental hack is unique to Chrysler," Harman CEO Dinesh Paliwal said to Automotive News. "This does not exist, to our assessment, in any other vehicle." The reason that the company wouldn't be involved is that automakers aren't simply plugging in the existing infotainment systems into new vehicles. According to Paliwal, Harman supplies the unit, but FCA and other automakers are able to make additional modifications for their vehicles. The National Highway Traffic Safety Administration has also recently taken up the question of broader software vulnerabilities in Harman's products. On July 29, the agency began investigating the company to check for similarities between Uconnect and the infotainment systems supplied to other automakers. The Jeep hack became national news when two researchers were remotely able to take control of a Cherokee. The vulnerability in the cellular connection even gave control over the brakes. "Once people get in the car and get into the CAN bus, then you can start to mimic and mess up many, many things in the car," Paliwal said to Automotive News. Politicians immediately responded with legislation to create federal standards in hopes of protecting drivers better. NHTSA also opened an investigation to make sure the automaker's software update actually solved the problem. Related Video:
Chrysler recalling hundreds of thousands of Jeep Grand Cherokee and Commander SUVs
Wed, 23 Jul 2014The public might associated ignition switch recalls with General Motors - and with good cause - but that's not the only automaker calling its vehicles back in to fix that sort of issue.
Last month we reported that the National Highway Traffic Safety Administration was investigating an array of Chrysler Group vehicles for electrical-related safety issues. The administration and Chrysler subsequently issued a recall for 700,000 Dodge Journey crossovers, Dodge Grand Caravan minivans and Chrysler Town & Country minivans. But while the Jeeps that were also under investigation were not covered in that recall, they are being addressed in a separate one now.
Although Chrysler reports that it is only aware of a single accident stemming from this issue, it is "committing now to conduct a recall out of an abundance of caution." The recall affects the 2006-2007 Jeep Commander and 2005-2007 Jeep Grand Cherokee, of which it reports there are 792,300 on the road: 649,900 in the United States, 28,800 in Canada, 12,800 in Mexico and a further 100,800 outside of North America.
Feds fretting over remote hack of Jeep Cherokee
Fri, Jul 24 2015A cyber-security gap that allowed for the remote hacking of a Jeep Cherokee has federal officials concerned. An associate administrator with the National Highway Traffic Safety Administration said Thursday that news of the breach conducted by researchers Chris Valasek and Charlie Miller had "floated around the entire federal government." "The Homeland Security folks sent out broadcasts that, 'Here's an issue that needs to be addressed,'" said Nathaniel Beuse, an associate administrator with the National Highway Traffic Safety Administration. Valasek and Miller commandeered remote control of the Cherokee through a security flaw in the cellular connection to the car's Uconnect infotainment system. From his Pittsburgh home, Valasek manipulated critical safety inputs, such as transmission function, on Miller's Jeep as he drove along a highway near St. Louis, MO. The scope of the remote breach is believed to be the first of its kind. The prominent cyber-security researchers needed no prior access to the vehicle to perform the hack, and the scope of the remote breach is believed to be the first of its kind. A NHTSA spokesperson said the agency's cyber-security staff members are "putting their expertise to work assessing this threat and the response, and we will take action if we determine it's necessary to protect safety." A Homeland Security spokesperson referred questions about the hack to Chrysler. Fiat Chrysler Automobiles has already been the subject of a federal hearing this month, in which officials scrutinized whether the company had adequately fixed recalled vehicles and repeatedly failed to notify the government about defects. But cyber-security concerns are a new and different species for the regulatory agency. Only hours before the Jeep hack was announced by Wired magazine earlier this week, NHTSA administrator Dr. Mark Rosekind said hacking vulnerabilities were a threat to privacy, safety, and the public's trust with new connected and autonomous technologies that allow vehicles to communicate. NHTSA outlined its response to the cyber-security challenges facing the industry in a report issued Tuesday. In it, the agency summarized its best practices for thwarting attacks and said it will analyze possible real-time infiltration responses. But the agency's ability to handle hackers may only go so far.