150 million cars will be connected to the Internet by 2020

In just five years, most cars and trucks will be connected to the Internet, according to a report from Gartner Inc. By 2020, about 150 million vehicles will be connected via Wi-Fi, and 60% to 75% of them will be capable of consuming, creating and sharing Web-based data, the report states.

The added connectivity will let carmakers change their business model from pure hardware to tech innovators that draw income from mobile apps. To do that, however, vehicle manufacturers will need to team up with companies such as Google, Apple and Samsung.

By 2018, two automakers will have announced plans to become technology companies and expand their connected-vehicle value experiences to other industries and devices. And by 2020, at least one auto company will achieve 10% of its total revenues from connected mobility and service offerings so says Gartner. As the amount of information being fed into in-car head unit or telematics systems grows, vehicles will be able to capture and share not only internal systems status and location data, but also changes in surroundings in real time.

In the future, apps will be tailored to in-vehicle services, such as scheduling service appointments, driver-related content such as real-time navigation updates, and streaming music and video services and even the ability to shop online or find and then pay for parking online. Also driving statistics can be anonymized and used to improve roadways. For example, analysis of vehicle tracking data could play a role in efforts to improve intersections where there are a lot of accidents.

The in-vehicle navigation service TomTom, for example, already routinely provides anonymized information to some police forces.

But once mobile devices are connected to car infotainment systems and cars are connected to the Internet, vehicles will become a rich source of data for manufacturers, marketers, insurance providers and the government.

http://www.computerworld.com/article/2853775/150m-passenger-cars

http://www.computerworld.com/article/2684298/once-your-cars-connected

http://uk.businessinsider.com/guardians-of-peace-hackers-sony-pictures-2014-12

http://cyberwar.einnews.com/article/238156027/

http://www.bbc.co.uk/news/world-asia-30366449

http://securityaffairs.co/wordpress/30791/cyber-crime/

http://cyberwar.einnews.com/article/238476119/

http://www.scmagazineuk.com/fbi-warning--destructive-attack-that-wipes-all-data/

http://www.independent.co.uk/news/people/princess-beatrices-salary-leaked

« North Korea continues cyber warfare against Sony
New York premiere of Sony film The Interview cancelled »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

FirstPoint Mobile Guard

FirstPoint Mobile Guard

FirstPoint Mobile Guard has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

Chainkit

Chainkit

Chainkit detects adversarial anti-forensic tampering techniques that attackers use to evade detection and prolong dwell times inside a system.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.