Cars Really Are Increasingly Vulnerable To Cyberthreats

The FBI has issued a warning that modern cars are "increasingly vulnerable" to hacking after researchers proved it is possible to disable brakes and manipulate steering remotely.

An official public service announcement released by the FBI recently warned that it is possible for hackers to “gain significant control over vehicle functions remotely by exploiting wireless communications vulnerabilities”. The announcement explained that new technology designed to enhance safety and improve fuel economy has led to increased connectivity, which has made vehicles more vulnerable to attacks.

“Modern motor vehicles often include new connected vehicle technologies that aim to provide benefits such as added safety features, improved fuel economy, and greater overall convenience," it read. “With this increased connectivity, it is important that consumers and manufacturers maintain awareness of potential cyber security threats."

Over the past year researchers have proven it is possible to develop methods of targeting the active cellular wireless and WiFi hotspots in vehicles.

They found that while attacks over WiFi were limited to a distance less than 100 feet from the car, they were able to achieve engine shutdown, disable brakes and manipulate steering when cellular connection was made.
The PSA provided advice on how to avoid remote exploits on vehicles. It stated that it is important to ensure vehicle software is up to date and to be careful when making modifications to vehicle software.

It also warned that drivers should be aware of who has physical access to the vehicle. “It is important that consumers and manufacturers are aware of the possible threats and how an attacker may seek to remotely exploit vulnerabilities in the future,” the announcement added.

Last year Fiat Chrysler recalled 1.4 million vehicles in the US after security researchers remotely controlled a Jeep. In January 2015 BMW AG said it had fixed a security flaw that could have allowed 2.2 million of vehicle doors to be remotely opened by hackers.

People who suspect their car has been hacked are advised to get in contact with the vehicle manufacturer or authorised dealer.

Indpendent: http://ind.pn/1VuZcRa

« Ex-CIA Chief: ‘If we don’t handle China well, it will be catastrophic’
Apple's Questionable Victory Over the FBI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO was founded in 2015 with the aim of counteracting the threats posed by globally organized cybercrime and state-controlled industrial espionage.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Cognyte

Cognyte

Cognyte are a market leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a safer world.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Vortacity Cyber

Vortacity Cyber

Vortacity is a boutique cybersecurity provider specializing in associations, nonprofits, and mission-based organizations.