Cyber security news for all

More

    Connected cars are exposed to serious cyber threats in the future

    The connected car is one of the central mobility topics. Numerous vehicle models from different manufacturers are already online, and in a few years the permanent connection between the vehicle, the systems of the manufacturers, other service partners and the internet will be standard. However, this also creates new dangers, because as cars become more and more rolling data centers, they are also exposed to the threats that are now common in IT.  Security experts clarify which attack vectors are particularly important in the connected car.

    Attacks Via Media Interfaces

    Modern vehicles have numerous media interfaces, for example Bluetooth, USB or WLAN hotspots; Users can use it to make phone calls, stream music, chat on Facebook or read emails; Attacks can be carried out using these means using simple means and standard tools, for example by injecting malicious code through infected media files or downloading it through applications in the vehicle. At best, the patching of the media components are only carried out as part of an inspection. The vehicle manufacturers rely on the services of the provider, since these are not part of their core business.

    Cybersecurity Connected Cars

    Attacks On Systems Through The Web

    Vehicle control units and head units from various manufacturers are already extensively exchanging data with manufacturer and internet services. About location, destinations, open windows and doors, service data or damage events. Relevant information can often be called up through vehicle apps on smartphones and web browsers. This also creates a central point of attack on vehicles. From a security point of view, there is the advantage that these systems are operated by most manufacturers as classic IT systems, so that they are also subject to the IT processes and are therefore regularly patched. The applications naturally have the same problems as other IT applications; Continuous security testing and a risk-adequate architecture are therefore essential.

    The digitalization of driving inevitably brings a new topic for IT security into the world. Cyberattacks on vehicles were previously individual attack scenarios. In the foreseeable future, this will be just as much a part of everyday security as ransomware or attacks on web servers. It is therefore important to take suitable measures against this threat.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]