Protecting Future Cars from Cyber Attacks

A new generation of Internet-connected cars will have to be better protected from hackers, under tough new government rules issued Sunday 6th August by Britain's Department for Transport (DfT).

Smart vehicles are increasingly becoming the norm on British roads, enabling drivers to access maps, travel information and new digital radio services from the driving seat.

But the DfT fears would-be hackers could target vehicles to access personal data, steal cars that use keyless entry, or even take control of technology for malicious reasons.

New government guidance issued by the DfT will ensure engineers developing smart vehicles will have to toughen up cyber protections and help design out hacking.

The government is looking at a broader program of work under a landmark Autonomous and Electric Vehicles Bill that aims to create a new framework for self-driving vehicle insurance.

The DfT says the legislation will put Britain at the center of new technological developments in smart and autonomous vehicles in what is still an emerging industry.

Manufacturers will have to design out cyber security threats as part of their development work.

"This will cement Britain as a world-leading location for research and development for the next generation of vehicles. And it forms part of the government's drive to ensure the country harnesses the economic and job-creating potential of new tech industries," said a spokesman for the DfT

Transport Minister Lord Callanan said: "Our cars are becoming smarter and self-driving technology will revolutionise the way in which we travel. Risks of people hacking into the technology might be low, but we must make sure the public is protected.

Whether we're turning vehicles into Wi-Fi connected hotspots or equipping them with millions of lines of code to become fully automated, it is important that they are protected against cyber-attacks."

Mike Hawes, CEO of the Society of Motor Manufacturers and Traders said: "We're pleased that government is taking action now it is championing cyber security at an international level.

These vehicles will transform our roads and society, dramatically reducing accidents and saving thousands of lives. A consistent set of guidelines is an important step towards ensuring Britain can be among the first, and safest, of international markets to grasp the benefits of this exciting new technology."

XinHuanet

You Might Also Read:

What Will The Car Of 2040 Be Like?:

Guidance For Connected Vehicle Security:

 

 

« Are Children 'Bingeing' on Social Media?
Insiders Are The Cause Of Most Healthcare Breaches »

Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

WEBINAR: Shifting Your Network Security Architecture To The Cloud

WEBINAR: Shifting Your Network Security Architecture To The Cloud

Thursday, July 8, 2021 - In this webinar, SANS and AWS Marketplace will discuss how to adapt network security architecture and control implementation to a cloud-based model.

Deep Secure

Deep Secure

Deep Secure’s Content Threat Removal platform delivers total protection of high value data for your business.

Cybereason

Cybereason

Cybereason provides real-time detection of malicious activity enabling you to identify the cause and scope of an attack and ensure an effective response.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor company serving customers across the spectrum of electronics applications including Smart Cars and the Internet of Things.

iWelcome

iWelcome

Europe's Identity Platform - iWelcome provides Identity & Access Management as a service (IDAAS).

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.