Stringent security protocols protect riders, officials say, despite recent claims that hackers can access information, including credit card numbers.
The New York City Taxi and Limousine Commission on Monday refuted recent claims that hackers can access sensitive information through touch-screen displays in taxicabs.
New York City software engineer Billy Chasen recently announced that he had gained access to the operating system for a touch-screen display in a New York City taxi cab and managed to get to the Internet. Chasen posted photos on his blog earlier this month showing that he accessed system files after seeing an error message on the screen.
Chasen said he opened files and "had full administrative access to everything on the PC," adding that he could have installed software from the Internet. He indicated that hackers could skim personal and financial information from customers who pay with credit cards.
Allan J. Fromberg, deputy commissioner for public affairs for the New York City Taxi and Limousine Commission, said that's not likely.
"There are extensive contract-required security protocols in place, which have exceeded government and credit card industry standards and have been stringently tested by internal and external security experts, which fully prevent access to anything other than media content residing in the taxicab itself," Fromberg said in an e-mail statement to InformationWeek. "There is no potential for any malicious activity."
VeriFone Transportation Systems spokesman Pete Bartolik also said during an interview last week that passengers' credit card data is encrypted and it is not stored locally, so it was not compromised. He also said the cab had an outdated modem, used while the city tested the display systems.
VeriFone Transportation Systems is one of New York City's taxi display system vendors.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.