The car of today — and especially tomorrow — relies on countless lines of software code to get those wheels moving, a reality that has placed increasing importance on automotive cybersecurity.
Even if you're not into car hacks, you should still learn about the future of vehicle cybersecurity and the challenge it represents. But if you are, read on to learn how I hacked my connected car.
Although connected devices make our daily lives easier, IoT data, if not properly secured, can cause serious financial and reputational damage to companies deploying and manufacturing this technology.
With its many manufacturer-sponsored test labs, smart car startups and military imperatives, Israel is becoming a major hub for connected car research.
To fight IoT crime, security professionals must properly classify incidents and connect seemingly disparate strings of evidence.
Security researchers have demonstrated how it is possible to use stickers to get computer vision systems in autonomous vehicles to wrongly identify signs.
A Controller Area Network (CAN) Bus standard vulnerability could impact the security of connected automobiles and other products.
While we cannot assess the true IoT impact on business until adoption becomes more widespread, its transformative potential is already on full display.
MOPs may allow a vehicle to cloak its position information from location services by using all radio communication channels available to it.
The vehicle area networks used by autonomous vehicles will need to protected with the most sophisticated security measures available.