Click me

Cybersecurity and Hacking Concerns for Today’s Cars and Tomorrow’s Driverless Vehicles

CYBERSECURITY AND HACKING CONCERNS FOR TODAY'S CARS AND TOMORROW'S DRIVERLESS VEHICLES Any device that's connected to the internet is at risk of hacking or manipulation. 55% According to a survey conducted by Munich Re, the world's second-biggest reinsurer, 55% of corporate risk managers name cybersecurity as the greatest concern about self-driving cars. They believe the greatest cyber threats to autonomous vehicles are: Auto theft by an unknown individual hacking into and overtaking vehicle data systems. Smart road infrastructure due to failure or cyber crime attack on the infrastructure. 42% 36% U.S. businesses spend more than $2 billion a year for cyber insurance policies. WHAT CAN BE HACKED IN YOUR CAR TODAY Modern cars have as many as 100 microcomputers. Attackers can access vehicle networks and driver data in a number of ways. Vulnerabilities may exist in: A car's wireless communication functions A mobile device (such as a cell phone or tablet connected to the car via a USB, Bluetooth, or WiFi) A third-party device connected througha vehicle diagnostic port Hackers can access the vehicle's controller network or data stored on the vehicle either directly or remotely. A 2013 study by the Defense Advanced Research Projects Agency (DARPA) found researchers could interfere with a "smart car" by: Make vehicles accelerate and turn Kill the brakes A 2014 report released by Massachusetts Senator Edward J. Markey found that nearly all cars are vulnerable to hacking. Automobile companies did not directly address the problem. GM Ford This led to a March 2015 class action lawsuit against Ford, General Motors, and Toyota for deliberately hiding dangers associated with car computer systems. In July 2015, Connecticut Senator Richard Blumenthal and Massachusetts Senator Edward J. Markey introduced the Security and Privacy in Your Car Act of 2015. SPY It is also known as the SPY Car Act. The bill has two purposes: To better inform consumers about vehicle cybersecurity and the use of driving data To create more secure vehicles The Spy Car Act proposes these requirements apply to all motor vehicles manufactured for sale in the U.S. 2 years after regulations are enacted. = 100,000 vehicles Fiat Chrysler announced a recall of 1.4 million vehicles in the U.S. in July 2015. The announcement was made days after cybersecurity researchers reported they could turn off a Jeep Cherokee's engine as it drove by way of a wireless connection 10 miles away. Customers had to update their on-board computer system. JUSTICE ARTMENT OF DUALINER **★★★ NHTSA AL BUREAUO NVESTIGATIO In March 2016 the Federal Bureau of Investigation (FBI) and the National Highway Traffic Safety Administration (NHTSA) issued a public service announcement warning the general public and manufacturers to: "Maintain awareness of potential issues and cybersecurity threats related to connected vehicle technologies in modern vehicles." MINIMIZE YOUR VULNERABILITY TO HACKING 001 1 To protect your car from computerized theft and hacking, consider these tips. Look into Tesla or General Motors (GM) cars. They reward "white hat" hackers who discover their products' vulnerabilities. Consider a less fancy car. Top-of-the-line luxury vehicles are typically equipped with more computers and connectivity features. If you want to be connected, buya car with the latest Apple CarPlay or Android Auto systems. Both systems are more secure than automotive entertainment systems. Ask about your car's wireless systems. This will keep you in the know about which systems can be operated remotely. Make sure your vehicle software is up to date but verify an update's authenticity first. Before updating anything, check the manufacturer's website to see if updates have been issued. Use a steering wheel lock. This helps prevent hackers from driving away even if they can hack into your car. Invest in an on-board diagnostic (OBD) system lock. The OBD system is how technicians diagnose repairs via all relevant computers that control the car. Get to know your OBD port. Familiarize yourself with what the port looks like, and if there's anything unusual plugged into it, or if it looks like it has been tampered with, call your dealership. The port is typically located under the dash on the driver's side. Use the central door lock button instead of the key fob. This helps prevent hackers from scanning your push-button locking system. Protect your keyless fob. This helps prevent hackers from using an amplifier that fools the car into thinking the fob is nearby, which would allow access to the car. Place your keyless fob in the refrigerator or in a tinfoil-lined box when it's not in use. Go to reputable dealers and repair shops. This helps prevent car computer system manipulation. If you think your car has been hacked, follow these steps: Check for outstanding vehicle recalls or software updates. Contact the vehicle manufacturer or authorized dealer. Contact the NHTSA. Contact the FBI. FUTURE RISKS FOR DRIVERLESS VEHICLES A completely driverless car, which requires no manual input from human passenger, isn't predicted to hit the roads until at least the 2020s. 90% While some advocates suggest that self-driving cars will reduce crashes by 90%, autonomous vehicles will likely introduce new risks including: System failures Offsetting behavior Rebound effects (the tendency of road users to take additional risks when they feel safer) (increased vehicle travel due to faster or cheaper travel) While driverless cars are the way of the future, today's cars have plenty of high-tech abilities that subject them to cybersecurity hacks. Take the right steps to keep your information, your car, and most importantly you safe. SOURCES: Brought to you by: In partnership with: Vound O Intella GHERGICH&Co.

Cybersecurity and Hacking Concerns for Today’s Cars and Tomorrow’s Driverless Vehicles

shared by Ghergich on Nov 28
55% of corporate risk managers believe cybersecurity is the greatest concern about self-driving cars. Learn how to minimize your vulnerability to the hacking of your car and future driverless vehicles.




Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy


Click the code to copy
Customize size