Self-Driving Car Poses High Hacking Risk

While major auto companies are working on introducing the futuristic self-driving technology in cars soon, this threatens to open new security problems for them as hackers have sensed an opportunity here, a researcher has predicted.

"We are a long way from securing the non-autonomous vehicles, let alone the autonomous ones," said Stefan Savage, computer science professor at the University of California-San Diago, in MIT Technology Review.

Pointing out security flaws to car companies which are into driverless car technology, the researcher said that extra computers, sensors and improved Internet connectivity required to make a car drive on its own increase the possible weak points.

Tech giant Google is working on autonomous cars as part of Google X project to develop technology for mainly electronic cars. The software installed in Google's cars is called Google Chauffeur.

Recently, with the help from Nasa space technology, automaker Nissan successfully test-drove its all-electric, driverless car at Nasa's Ames Research Centre in California.

Swedish automobile giant Volvo is also developing intelligent high bandwidth streaming capabilities in collaboration with Ericsson's cloud expertise and network to create a highway full of autonomous cars.

Tesla Motors, an American automotive and energy storage company, is also serious about self-driving car tech and hired processor design veteran Jim Keller to lead its autopilot hardware engineering team.

How does this technology work? The self-driving cars, or prototypes, rely on sensors to determine the surroundings and objects like pedestrians, cyclists and other vehicles around it.

The software assisting the sensors then decides the speed and trajectory to drive safely.

How is this technology a threat to security? Savage said that it is possible to take control of conventional vehicles in various ways, for example by dialing into a car's built-in cellular connection or by giving a driver a music CD that makes the car connect to an attacker's computer.

Once inside the system, the hackers can take control of the brakes, engine or other components of a person's car remotely.

The developers are still not able to isolate these "important" parts of the car because everything must be connected to enable many functions people expect of cars.

This is also owing to the fact that carmakers do not know exactly what software is inside the vehicles they sell because the third-party suppliers guard the details of the software inside, things like the brake-control system or central locking components.

NDTV: http://bit.ly/1UE4wPu

« How to Recover From The Hack Nightmare
TalkTalk's Cybersecurity Lesson »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Momentum Cyber

Momentum Cyber

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

Leidos

Leidos

Leidos is a recognized leader in cybersecurity across the federal government, bringing more than a decade of experience defending cyber interests globally.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Amvia

Amvia

Amvia is a fast-growing telecoms, Internet and Microsoft service provider. We supply voice, data and cyber security services to 100s of small and large companies.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

PayPal Ventures

PayPal Ventures

PayPal Ventures invests in companies at the forefront of innovation in fintech, payments, commerce enablement, artificial intelligence, blockchain and cryptocurrency, regulatory and cyber technology.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

SteelGate

SteelGate

SteelGate’s core capabilities are centered around architecture design and engineering of network, systems, and cybersecurity solutions.