Self-Driving Car Poses High Hacking Risk

While major auto companies are working on introducing the futuristic self-driving technology in cars soon, this threatens to open new security problems for them as hackers have sensed an opportunity here, a researcher has predicted.

"We are a long way from securing the non-autonomous vehicles, let alone the autonomous ones," said Stefan Savage, computer science professor at the University of California-San Diago, in MIT Technology Review.

Pointing out security flaws to car companies which are into driverless car technology, the researcher said that extra computers, sensors and improved Internet connectivity required to make a car drive on its own increase the possible weak points.

Tech giant Google is working on autonomous cars as part of Google X project to develop technology for mainly electronic cars. The software installed in Google's cars is called Google Chauffeur.

Recently, with the help from Nasa space technology, automaker Nissan successfully test-drove its all-electric, driverless car at Nasa's Ames Research Centre in California.

Swedish automobile giant Volvo is also developing intelligent high bandwidth streaming capabilities in collaboration with Ericsson's cloud expertise and network to create a highway full of autonomous cars.

Tesla Motors, an American automotive and energy storage company, is also serious about self-driving car tech and hired processor design veteran Jim Keller to lead its autopilot hardware engineering team.

How does this technology work? The self-driving cars, or prototypes, rely on sensors to determine the surroundings and objects like pedestrians, cyclists and other vehicles around it.

The software assisting the sensors then decides the speed and trajectory to drive safely.

How is this technology a threat to security? Savage said that it is possible to take control of conventional vehicles in various ways, for example by dialing into a car's built-in cellular connection or by giving a driver a music CD that makes the car connect to an attacker's computer.

Once inside the system, the hackers can take control of the brakes, engine or other components of a person's car remotely.

The developers are still not able to isolate these "important" parts of the car because everything must be connected to enable many functions people expect of cars.

This is also owing to the fact that carmakers do not know exactly what software is inside the vehicles they sell because the third-party suppliers guard the details of the software inside, things like the brake-control system or central locking components.

NDTV: http://bit.ly/1UE4wPu

« How to Recover From The Hack Nightmare
TalkTalk's Cybersecurity Lesson »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Calamu

Calamu

Calamu is a software-defined storage security and resiliency platform that keeps your data secure and accessible wherever you choose to store it.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

Mindgard

Mindgard

The Mindgard Security Copilot platform secures your Artificial Intelligence, GenAI and LLMs.