(707) 268-8850    Get SUPPORT

Network Management Services Blog

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

Today’s cars are equipped with more complicated computer systems that allow users access to cutting-edge technology and services. Due to the increasing number of cyber attacks on computerized cars, Volkswagen has chosen to team up with three Israeli cybersecurity experts to equip advanced vehicles with the proper security solutions.

Ownership and investments made by both parties haven’t been made public yet, the new partnership has adopted the name Cymotive, and its goal is clear. Its chairman, Yuval Duskin, formerly sat at the helm of the Israeli Security Services, and said: “Together with Volkswagen we are building a top-notch team of cyber security experts. We are aware of the significant technological challenges that will face us in the next years in dealing with the cyber security threats facing the connected car and the development of the autonomous car."

It’s dangerous to assume that a hacker can’t get to you in your own car. Bluetooth connectivity and computerized dashboards have given criminals brand new ways to infiltrate connected cars. Researchers have recently discovered a way for an intruder to hack into Volkswagen vehicles using nothing but an inexpensive radio kit. This flaw affects vehicles sold since 2000, so there’s huge potential for this to cause trouble for millions of owners.

Volkswagen is far from being the only car manufacturer that produces systems that are at risk. Check out this YouTube video where two seasoned hackers use a laptop to control a Jeep Cherokee. They connected the laptop to the controller area network (or CAN bus) and were able to take complete control of the vehicle’s brakes. While this is a local hack, it could very well become a threat that could be controlled remotely.

Though the video seems proof enough that this trend is a problem, upon submitting their findings to Fiat Chrysler Automobiles--the manufacturer of the Jeep brand--their findings were swiftly dismissed as invalid and inappropriate, claiming that sharing “how-to information” could put the public at risk. They further claimed that the attack required considerable technical knowledge to use, and that the flaws had already been addressed.

Granted, hackers are always trying to find new vulnerabilities and exploits to test their mettle against. Whether it’s a vehicle computer or a corporate workstation, you can bet that in the near future hackers will find ways to infiltrate and exploit them. This race won’t end anytime soon, so it looks like hackers and cyber security professionals will be trapped in an endless cycle of hack or be hacked.

Will your next automotive purchase include a computerized system, or would you rather keep it simple? Let us know in the comments.

Tip of the Week: Access Old Clipboard Content With...
Do Memes Have a Place in the Professional Business...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 24 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup Mobile Devices VoIP Email Google Tech Term Data Data Recovery Outsourced IT IT Support Internet of Things Saving Money Cloud Computing Internet IT Services Microsoft Software Communications BDR Hardware Business Continuity Efficiency Ransomware Smartphones Business Cybercrime Cybersecurity Communication Small Business Server Android User Tips Disaster Recovery Artificial Intelligence Managed IT Services Alert Computers Smartphone Windows Avoiding Downtime How To Save Money Managed IT Gadgets Browser Network Collaboration Miscellaneous Money Chrome Phishing Firewall Router Social Media BYOD Mobile Device Management Applications Law Enforcement Business Intelligence Two-factor Authentication Social Engineering Computer Windows 10 Data Security Data Protection Passwords Workplace Tips Productivity Business Management Mobility Vulnerability Office 365 VPN Compliance Connectivity Word Upgrade Document Management Managed Service Provider Spam Facebook Private Cloud Productivity Bandwidth Flexibility Redundancy Remote Monitoring Identity Theft Proactive IT Operating System IT Support Telephone Systems Virtualization Blockchain Budget Big Data Business Owner Hacking Website Information Technology IT Plan Infrastructure Update Work/Life Balance Training Workers Physical Security Automation Sports Unsupported Software Servers Government Settings Data Storage Windows 10 Data Breach Google Drive Content Filtering CES Mobile Computing Spam Blocking Wi-Fi Information File Sharing Quick Tips Encryption Office Tips Public Cloud Access Control Mobile Device Employer-Employee Relationship Content Management Paperless Office Smart Tech Managed Service Value Apps Data loss Data storage Networking App OneNote Bring Your Own Device Solid State Drive Comparison Credit Cards Holiday Microsoft Office IT Management Windows 7 Virtual Assistant Unified Threat Management Analysis Password NIST Wireless Charging Nanotechnology Keyboard CrashOverride Tools Camera Emergency Human Resources Healthcare Outlook Specifications Fraud Leadership Internet exploMicrosoft Practices Audit Telephony SaaS eWaste Wire Trending Regulations Telephone System Cleaning Netflix Storage Hosted Solution Cast Accountants Cryptocurrency Office Fiber-Optic Downtime Patch Management Cortana Staff Electronic Health Records Frequently Asked Questions Millennials Amazon Advertising Hosted Computing Legal Risk Management Computer Fan Skype Criminal Education Lifestyle Computer Care Password Manager Recovery Current Events User Error Safe Mode Relocation Cables Devices Root Cause Analysis Botnet Scam Colocation Digital Signature Machine Learning Save Time Excel Workforce Amazon Web Services webinar Inventory FENG Start Menu MSP Hiring/Firing Health Smart Office Software Tips HVAC Flash Samsung Business Mangement Addiction Google Docs Knowledge IoT HaaS Tip of the week Telecommuting Charger Humor Unified Communications Emails Thought Leadership Meetings Travel Computing Infrastructure YouTube Online Shopping Conferencing HIPAA Mobile Augmented Reality Remote Worker Files Enterprise Content Management Network Congestion Internet Exlporer Entertainment Windows 10s Wireless Technology Apple Gmail Cache Data Warehousing Voice over Internet Protocol Electronic Medical Records Reputation Windows Server 2008 Remote Work Safety Business Technology Theft Streaming Media USB IBM Strategy Evernote Hybrid Cloud Authentication Professional Services The Internet of Things Wiring Students HBO Marketing Hacker Password Management Customer IT Consultant End of Support Insurance Sync Hard Drives iPhone Recycling PDF Wireless Internet Black Market Multi-Factor Security Google Apps Content Filter Screen Mirroring Software as a Service Monitor Supercomputer History Data Management Rootkit Video Games IP Address Employer Employee Relationship Remote Monitoring and Maintenance Battery Users How to Customer Service Techology Mobile Office Remote Computing Experience Printers Computer Accessories Domains Line of Business Wireless Regulation Twitter WiFi Two Factor Authentication Content Vendor Management Scalability Music Bluetooth Best Practice Politics Public Speaking Assessment Audiobook Presentation Shadow IT Lithium-ion battery Fun Wearable Technology Transportation Books Television Virtual Reality 5G Tech Support Webinar Benefits Administration Company Culture Automobile Worker Public Computer Worker Commute Proactive Loyalty Competition Search IT solutions Instant Messaging Troubleshooting Customer Relationship Management Smart Technology Managing Stress