German

Are Connected Cars on a Collision Course with Network Security?

by VPNHaus | 08/25/2014 |Industry Commentary

Flipping through any consumer publication that rates vehicles, you'll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy.

What you won't find is an assessment of the car's risk of being remotely hacked. Unfortunately, if you happen to drive a 2014 Jeep Cherokee or 2015 Cadillac Escalade, your vehicle would likely have a one-star review in Consumer Reports for cybersecurity.

These vehicles, along with 22 others with network capabilities, were profiled by researchers Charlie Miller and Chris Valasek during Black Hat 2014 earlier this month. They warned that a malicious attacker could hack into a connected car, doing anything from "enabling a microphone for eavesdropping to turning the steering wheel to disabling the brakes."

Days later, during the DefCon hacker conference, a group of security researchers calling themselves "I Am The Cavalry" sounded the same alarm, urging the automobile industry to build safer computer systems in vehicles.

The warning comes years after automakers started testing the connected car waters, most notably Ford, as far back as 2010, with its "MyFord Touch" mobile Wi-Fi hotspot. Since then, Google has been in the driver's seat of the connected car movement. There's been buzz around Google's efforts to produce self-driving cars for years, and the smoke signals only grew more prominent after Google moved its head of Android, Andy Rubin, to the robotics division of the company.

While the convenience of connected cars will no doubt increase their popularity, it's important for manufacturers of all network-ready vehicles to remember the importance of security technology. As we wrote last year about connected cars, attackers don't care what mobile endpoint they're hacking – as long as it's connected to the Internet, it's a target.

Remote Access VPNs For Dummies

 

Remote Access VPN For Dummies</em>, we cover:

- The full VPN landscape, including hybrid IPsec/SSL VPN solutions
- The evolution of remote access VPN
- How to provide users with secure remote access
- How to simplify remote access VPN and reduce costs

Download Now

Remote Access VPN For Dummies</em>, we cover:

- The full VPN landscape, including hybrid IPsec/SSL VPN solutions
- The evolution of remote access VPN
- How to provide users with secure remote access
- How to simplify remote access VPN and reduce costs

Download Now

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK