How Secure Are The Connected Cars?
Today's connected cars are technologically advanced, but drivers could be at risk if hackers and digital thieves get a hold of the data possessed by the car.
Today's Connected Cars
An entirely new market in the automotive industry has been created by the Internet of Things (IoT). Connected car services are transforming the industry and driving recurring revenue growth.
Market analysts expect this trend to continue, growing to top $42 billion by the year 2022, according to a report published on the website strategyand.pwc.com. Other analysts are even more optimistic, expecting the connected car market to reach $155 billion by 2022, according to researchandmarkets.com. In 2020, as much as 75 percent of the estimated 92 million cars globally shipped are expected to be built with internet connectivity, according to Business Insider.
According to Venture Beat, the connected car is one of the fastest-growing market niches within the Internet of Things. The convergence of in-vehicle technologies and IoT, like collision avoidance systems, onboard GPS, remote diagnostics and 4G LTE Wi-Fi hotspots, has opened new exciting opportunities in this industry.
Connected Cars' Security Risks
According to CSO Online, vehicles contain critical personal information such as financial information, registration and insurance details, personal contacts and even the address to the owner's home. This is leading to a great risk of entry, theft and further damage.
The nature of vehicle theft has changed with the emergence of sophisticated technology. A major risk for today's vehicle owner is a network of criminals known as "Connected Vehicle Thieves." They are connected, smarter and more targeted. According to LoJack, a company specialized in providing of vehicle theft recovery and advanced fleet management solutions, this new type of thieves can take advantage of the vehicles' technology.
An advanced form of vehicle theft is called car cloning. A stolen vehicle can get a fake vehicle identification number (VIN) created and installed by thieves. For instance, high-end luxury vehicles are stolen and sold overseas for profit by using this method of car cloning. Hackers can then use the fake VINs to create false new documents or to alter ownership forms, in order to hide a stolen car's true identity.
Another growing type of cyber crime is the use of vehicle-enabled ransom. Malware called ransomware is installed to encrypt digital data. The victim is asked to pay the criminal a ransom in order to be allowed to recover the decrypted information.
Vehicle-enabled ransomware is a predictable next step for hackers, with the emergence of vehicles being used as WiFi hotspots. Hackers can exploit this new avenue to commit digital "kidnapping" of connected cars. For instance, they could easily break into a vehicle in the near future, disable the engine and brakes, and demand bitcoin in order to restore the car to its functional state.
Other methods of cyber crime against connected cars include using scanner boxes as smart keys, theft rings targeting luxury vehicles, remote hacking and identity theft. Modern vehicles are vulnerable to a complete navigation takeover or, at least, to debilitating cyber security attacks. Thieves targeting connected vehicles can also store the data in them, including location information credit card details, personal IDs and Social Security numbers.
How A Critical Flaw In Samsung's SmartCam Security Cameras Could Allow Hackers To Spy On
A team of researchers (or ethical hackers) known as Exploitee.rs have discovered a critical flaw of Samsung's SmartCam which can literally give hackers full access to the security cameras.
The Most Delicate Cyber Security Issues That Might Happen In 2017
Considering that there has been a lot of cyber strikes to major websites and institution, both cyber security and hackers method to maintain the effectiveness of their attacks will increase in 2017.
Nintendo Will Pay Hackers Up To $20,000 To Find 3DS Security Flaws
The Nintendo 3DS in one of the gaming consoles that hackers are targeting the most, so the company is betting a lot on excel its security system in order to avoid any other incident.
Tor Project Is Creating An Ultra Secure And Private Version Of Android
Privacy and security has been one of people´s main concerns over the past years, giving the fact that getting monitored has been a situation that has repeated without any way of avoiding it.
Drones Will Be Used To Spot Sharks In Australian Beaches
Shark attacks have become one of the most delicate issues in Australia this year, since many people had suffered this terrible situation.
If drones complete their mission effectively, this could be the beginning of a new era in which helicopters and patrols will no longer be used for this labors.
MORE IN ITECHPOST
3 Free Ways to Track a Cell Phone by Number
Check out our three verified methods to track a cell phone using their number. Signup to Spyic now for free and access the phone’s location in real-time. Use it in any Android or iOS device without rooting or jailbreaking. See also Cocospy and Spydialer.
A New Material for the Battery of the Future, Made in UCLouvain
Renewable sources of energy such as wind or photovoltaic are intermittent. The production peaks do not necessarily follow the demand peaks.
Top 5 Video Games to Play for a Truly Unique First Date
Video games have a way of taking us outside of ourselves and live in a fantasy world. It's even better when you're playing a game with someone special!