Vehicle Cyber Crime Attacks Double

The threat of attacks of attacks on vehicle is growing and the concept of car cybercrime will become much more common with the increasing number of cars on the road which are vulnerable to hackers and scammers, according to research carried out by online comparison firm Uswitch.

As more connected devices come into your home the levels of risk involved increases. The awareness that scammers and hackers are actively targeting the growing network of IoT devices is becoming common knowledge and taking steps to keep  personal data safe has become part of everyday life. However, there’s one device you may not consider when keeping tabs on your data security, your car.

When talking about ‘connected cars’, this is essentially shorthand for vehicles that send data about the driver and internal systems back to the manufacturer over the Internet. The term also applies to actions the owner can perform with the car. These might include remote locking, linking up your smartphone to play your favourite tunes or even using an in-car app to pay at a toll booth.

Cyber-attacks on connected cars have increased by 99% in the last year, according to Uswitch. Potential threats include cyber-attacks against cars’ perception sensors, which could trick vehicles into ‘seeing’ something that is not there, or not seeing something that is. 

Connected cars can collect up to 25GB of data from various sources every hour and hackers can try to manipulate vehicles through data connections and ‘shared information protocols’, such as vehicle-to-vehicle or traffic monitoring, using a vehicle’s in-built Apps that can track things like location, entertainment preferences and even financial information.

The online and telephone comparison and switching service USwitch has identified several ways that vehicles can be compromised, ranging from weaknesses in apps and theft of personal data, to keyless car theft and  taking control of a vehicle remotely. Many people also sync their phone with their car to use Apps and entertainment systems, as well as share contacts for hands-free calls via the in-built speakers.

Each of these connections are an increased opportunity for hackers to find a vulnerability and steal data via remote access.

Apps that communicate directly with cars are becoming more popular and this makes them a tempting target for criminals.
If these applications have any vulnerabilities, they can allow for unauthorised access to the owner’s personal data and even features of the car itself. 

Nissan had to shut down one of its Apps after testing by security researchers revealed a vulnerability that could allow hackers to remotely control the car’s heated seating, fans, air conditioning and heated steering wheel. Keyless theft or key hacking is another way thieves attack the systems used to control a car.When the key is near the car, it passively sends out the signal that tells it to unlock. Car thieves have figured out a way to scan for that signal and then hack it, to give them access to the car.

In certain scenarios, hackers are also able to take control of safety-critical aspects of a vehicle’s operation. This means that some vehicles may contain vulnerabilities that allow hackers to access functions like steering control, braking and even turning off the engine. 

Connected cars send data about the driver and vehicle systems back to the manufacturer over the internet. They also allow owners to carry out actions such as remote locking, smartphone linking to play music or using an app to pay at a toll booth.

While all these actions happen at the click of a button or touch of a screen, a lot of complex programming required to make it seem so simple. A modern car uses about 150million lines of computer code, while a Boeing 787 jet uses just 6.5million. All this coding makes cars potentially very vulnerable.

AutomotiveManagement:       USwitch:       Daily Record:    Inst. of Mechanical Engineers

You Might Also Read:

Cyber Criminals Target UK Motorists:

 

« Coronavirus Tracing Apps Conflict With Privacy
Five Ways Automation Can Help Fix The Cybersecurity Skills Shortage »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

Vention

Vention

Vention (formerly iTechArt) is the partner of forward-thinking tech leaders around the globe.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.

Foresights

Foresights

Foresights is a Nordic company utilizing advanced intelligence tradecraft and extensive cyber security capabilities to deliver services and advisory tailored to our client’s critical requirements.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.