Cars Really Are Increasingly Vulnerable To Cyberthreats

The FBI has issued a warning that modern cars are "increasingly vulnerable" to hacking after researchers proved it is possible to disable brakes and manipulate steering remotely.

An official public service announcement released by the FBI recently warned that it is possible for hackers to “gain significant control over vehicle functions remotely by exploiting wireless communications vulnerabilities”. The announcement explained that new technology designed to enhance safety and improve fuel economy has led to increased connectivity, which has made vehicles more vulnerable to attacks.

“Modern motor vehicles often include new connected vehicle technologies that aim to provide benefits such as added safety features, improved fuel economy, and greater overall convenience," it read. “With this increased connectivity, it is important that consumers and manufacturers maintain awareness of potential cyber security threats."

Over the past year researchers have proven it is possible to develop methods of targeting the active cellular wireless and WiFi hotspots in vehicles.

They found that while attacks over WiFi were limited to a distance less than 100 feet from the car, they were able to achieve engine shutdown, disable brakes and manipulate steering when cellular connection was made.
The PSA provided advice on how to avoid remote exploits on vehicles. It stated that it is important to ensure vehicle software is up to date and to be careful when making modifications to vehicle software.

It also warned that drivers should be aware of who has physical access to the vehicle. “It is important that consumers and manufacturers are aware of the possible threats and how an attacker may seek to remotely exploit vulnerabilities in the future,” the announcement added.

Last year Fiat Chrysler recalled 1.4 million vehicles in the US after security researchers remotely controlled a Jeep. In January 2015 BMW AG said it had fixed a security flaw that could have allowed 2.2 million of vehicle doors to be remotely opened by hackers.

People who suspect their car has been hacked are advised to get in contact with the vehicle manufacturer or authorised dealer.

Indpendent: http://ind.pn/1VuZcRa

« Ex-CIA Chief: ‘If we don’t handle China well, it will be catastrophic’
Apple's Questionable Victory Over the FBI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Nudge Security

Nudge Security

Nudge Security offer the world's first-ever SaaS security solution to discover shadow IT and curb SaaS sprawl across any device or location and nudges employees towards optimal security behavior.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.