Smart Car

2017/08/21

The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard

The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard

In many instances, researchers and engineers have found ways to hack into modern, internet-capable cars, as has been documented and reported several times. One famous example is the Chrysler Jeep hack that researchers Charlie Miller and Chris Valasek discovered. This hack and those that have come before it have mostly been reliant on specific vulnerabilities in specific makes and/or brands of cars.

2016/10/14

IoT Design Flaws and Security Guidelines

IoT Design Flaws and Security Guidelines

We look at IoT as a system that connects an infinite number of devices to the Internet. This new era of IoT brings the possibility of improving our lives in many different ways like smart homes, smart cities, and smart cars.

2016/08/10

Car Hacking Issues Spark Change in the Automotive Industry

Car Hacking Issues Spark Change in the Automotive Industry

It seems like something out of an action flick—a hacker taking control of a car remotely, steering it, stopping it, and even stealing it. Not anymore. Modern vehicles are becoming increasingly connected, and more reliant on automated systems. The scenarios we once saw play out on screen have turned into a risky reality.

2015/11/26

Expert Insight: Securing Smart Cars

Expert Insight: Securing Smart Cars

Like any new and emerging technology, smart cars also have its share of security loopholes that exposes user data and privacy to risk. Unfortunately, they can also pose risks to physical safety. The notion of car hacking seemed far-fetched a few years ago, but the recent proliferation of connected, automated, and self-driving cars bring to the fore both the benefits and vulnerabilities that come with smart cars.

2015/08/29

Car Hacking: The Very Real Possibility of Hackers Driving Your Car

Car Hacking: The Very Real Possibility of Hackers Driving Your Car

Car hacks are no longer science fiction, it’s now reality. And it holds a stark future for us if it’s not addressed and fast.
Just last month, security researchers Chris Valasek and Charlie Miller discovered in a sponsored stunt that they could hijack a Cherokee Jeep’s infotainment system using a simple 3G connection.

2015/08/04

Is Your Car Connected or Protected?

Is Your Car Connected or Protected?

Could you have imagined five years ago that the car you’re driving would have greater computing power than the Apollo 11 that landed on the moon? And could you have imagined that those same cars would be manufactured with state-of-the-art roll bars, airbags and anti-lock brakes to prevent accident and injury, but not sufficient cyber security? Unfortunately that’s the reality now facing us.

2015/07/28

Is Your Car Broadcasting Too Much Information?

Is Your Car Broadcasting Too Much Information?

Car hacking is a reality the general public will have to deal with. Nothing can be as intrusive and dangerous as strangers taking over your car while you are driving it. Last week, Valasek and Miller’s digital car-jacking stunt using 3G connectivity on a Jeep Cherokee’s infotainment system illustrated how life-threatening this situation can get. The discovery of the bug has since led to the recall of of 1.4 million vehicles.

2015/02/05

Automotive Security: Connected Cars Taking the Fast Lane

Automotive Security: Connected Cars Taking the Fast Lane

Last January 30, several security loopholes in BMW’s ConnectedDrive system, that could allow potential thieves to unlock doors and track car data using a mobile device, as the security gap may affect the transmission path via the mobile phone network were revealed. This was uncovered during a privacy assessment conducted by the German auto club ADAC, and is believed to affect 2.2 million BMW vehicles worldwide.

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop