(707) 268-8850    Get SUPPORT

Network Management Services Blog

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

Today’s cars are equipped with more complicated computer systems that allow users access to cutting-edge technology and services. Due to the increasing number of cyber attacks on computerized cars, Volkswagen has chosen to team up with three Israeli cybersecurity experts to equip advanced vehicles with the proper security solutions.

Ownership and investments made by both parties haven’t been made public yet, the new partnership has adopted the name Cymotive, and its goal is clear. Its chairman, Yuval Duskin, formerly sat at the helm of the Israeli Security Services, and said: “Together with Volkswagen we are building a top-notch team of cyber security experts. We are aware of the significant technological challenges that will face us in the next years in dealing with the cyber security threats facing the connected car and the development of the autonomous car."

It’s dangerous to assume that a hacker can’t get to you in your own car. Bluetooth connectivity and computerized dashboards have given criminals brand new ways to infiltrate connected cars. Researchers have recently discovered a way for an intruder to hack into Volkswagen vehicles using nothing but an inexpensive radio kit. This flaw affects vehicles sold since 2000, so there’s huge potential for this to cause trouble for millions of owners.

Volkswagen is far from being the only car manufacturer that produces systems that are at risk. Check out this YouTube video where two seasoned hackers use a laptop to control a Jeep Cherokee. They connected the laptop to the controller area network (or CAN bus) and were able to take complete control of the vehicle’s brakes. While this is a local hack, it could very well become a threat that could be controlled remotely.

Though the video seems proof enough that this trend is a problem, upon submitting their findings to Fiat Chrysler Automobiles--the manufacturer of the Jeep brand--their findings were swiftly dismissed as invalid and inappropriate, claiming that sharing “how-to information” could put the public at risk. They further claimed that the attack required considerable technical knowledge to use, and that the flaws had already been addressed.

Granted, hackers are always trying to find new vulnerabilities and exploits to test their mettle against. Whether it’s a vehicle computer or a corporate workstation, you can bet that in the near future hackers will find ways to infiltrate and exploit them. This race won’t end anytime soon, so it looks like hackers and cyber security professionals will be trapped in an endless cycle of hack or be hacked.

Will your next automotive purchase include a computerized system, or would you rather keep it simple? Let us know in the comments.

Tip of the Week: Access Old Clipboard Content With...
Do Memes Have a Place in the Professional Business...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Hosted Solutions VoIP Mobile Devices Email Google Outsourced IT Tech Term Data Data Recovery IT Support Saving Money Internet Internet of Things Microsoft IT Services Software Cloud Computing Communications Hardware BDR Business Continuity Efficiency Ransomware Cybercrime Cybersecurity Business Smartphones Communication Small Business Server User Tips Disaster Recovery Android Artificial Intelligence How To Network Save Money Computers Managed IT Smartphone Windows Alert Managed IT Services Gadgets Browser Avoiding Downtime Vulnerability Miscellaneous Money Social Media Workplace Tips Mobility Mobile Device Management Business Management Two-factor Authentication Computer Social Engineering Collaboration Law Enforcement Passwords Business Intelligence Chrome Data Security Data Protection Firewall Windows 10 Phishing Router BYOD Productivity Applications Blockchain Productivity Bandwidth Office 365 Flexibility VPN Upgrade Proactive IT Spam Telephone Systems Word IT Support Managed Service Provider Connectivity Private Cloud Compliance Document Management Remote Monitoring Redundancy Facebook Budget Operating System Identity Theft Virtualization File Sharing Big Data IT Management Office Tips Windows 7 Credit Cards Website Hacking Managed Service Analysis Mobile Device Value IT Plan App Networking Update Infrastructure Solid State Drive Physical Security Bring Your Own Device Automation Windows 10 Unsupported Software Virtual Assistant Holiday Government Unified Threat Management Password Sports Servers Data Storage Business Owner Google Drive Wi-Fi Mobile Computing Information Technology CES Work/Life Balance Spam Blocking Quick Tips Public Cloud Employer-Employee Relationship Training Workers Encryption Apps Settings Content Management Paperless Office Access Control Data storage Data Breach Smart Tech Data loss Microsoft Office Comparison Information Content Filtering OneNote History Samsung HaaS Students Sync Knowledge Evernote Authentication Multi-Factor Security Monitor Charger Emails Recycling Wireless Internet Remote Worker Insurance Screen Mirroring Software as a Service Enterprise Content Management Content Filter Outlook Specifications Internet exploMicrosoft HIPAA CrashOverride Tools Conferencing Google Apps Trending Business Technology Human Resources Healthcare Entertainment Audit Telephony Electronic Medical Records Network Congestion Wireless Charging Nanotechnology eWaste Wire Regulations Office Wiring Fraud Practices USB Cast Cortana Password Management Storage Frequently Asked Questions Millennials Advertising Accountants Downtime Lifestyle User Error Staff Electronic Health Records Computer Fan Skype IT Consultant Fiber-Optic PDF Black Market NIST Criminal Data Management Relocation Camera Supercomputer Amazon Hosted Computing Colocation Password Manager Excel Workforce Emergency Keyboard Root Cause Analysis Botnet Hiring/Firing Health Software Tips Telephone System SaaS Digital Signature Machine Learning FENG Start Menu Leadership Cables Devices Cryptocurrency Cleaning Netflix Smart Office Flash Humor Amazon Web Services Inventory Hosted Solution Augmented Reality Google Docs Computing Infrastructure Business Mangement Addiction Tip of the week Telecommuting Patch Management IoT Wireless Technology Meetings Travel Files IBM Reputation Internet Exlporer Legal YouTube Risk Management Safety Mobile Apple Unified Communications Thought Leadership Education Safe Mode Computer Care Marketing Windows 10s Hacker Current Events Online Shopping Recovery The Internet of Things Data Warehousing Voice over Internet Protocol Gmail Cache Save Time Windows Server 2008 Remote Work Hybrid Cloud MSP Scam HVAC HBO Customer End of Support Strategy Professional Services Hard Drives iPhone webinar Theft Streaming Media Audiobook IP Address Search Shadow IT Users Transportation Wearable Technology Virtual Reality Customer Service Books Television Managing Stress Mobile Office Webinar Automobile Benefits Domains Worker Commute Proactive Public Computer Wireless Worker Loyalty IT solutions Smart Technology Instant Messaging Troubleshooting Public Speaking WiFi Twitter Remote Monitoring and Maintenance Video Games Presentation Rootkit Lithium-ion battery Employer Employee Relationship Battery Techology Fun Printers How to Tech Support Line of Business Remote Computing Experience 5G Regulation Computer Accessories Content Two Factor Authentication Administration Scalability Music Vendor Management Customer Relationship Management Assessment Best Practice Company Culture Politics Competition Bluetooth