Protecting Future Cars from Cyber Attacks

A new generation of Internet-connected cars will have to be better protected from hackers, under tough new government rules issued Sunday 6th August by Britain's Department for Transport (DfT).

Smart vehicles are increasingly becoming the norm on British roads, enabling drivers to access maps, travel information and new digital radio services from the driving seat.

But the DfT fears would-be hackers could target vehicles to access personal data, steal cars that use keyless entry, or even take control of technology for malicious reasons.

New government guidance issued by the DfT will ensure engineers developing smart vehicles will have to toughen up cyber protections and help design out hacking.

The government is looking at a broader program of work under a landmark Autonomous and Electric Vehicles Bill that aims to create a new framework for self-driving vehicle insurance.

The DfT says the legislation will put Britain at the center of new technological developments in smart and autonomous vehicles in what is still an emerging industry.

Manufacturers will have to design out cyber security threats as part of their development work.

"This will cement Britain as a world-leading location for research and development for the next generation of vehicles. And it forms part of the government's drive to ensure the country harnesses the economic and job-creating potential of new tech industries," said a spokesman for the DfT

Transport Minister Lord Callanan said: "Our cars are becoming smarter and self-driving technology will revolutionise the way in which we travel. Risks of people hacking into the technology might be low, but we must make sure the public is protected.

Whether we're turning vehicles into Wi-Fi connected hotspots or equipping them with millions of lines of code to become fully automated, it is important that they are protected against cyber-attacks."

Mike Hawes, CEO of the Society of Motor Manufacturers and Traders said: "We're pleased that government is taking action now it is championing cyber security at an international level.

These vehicles will transform our roads and society, dramatically reducing accidents and saving thousands of lives. A consistent set of guidelines is an important step towards ensuring Britain can be among the first, and safest, of international markets to grasp the benefits of this exciting new technology."

XinHuanet

You Might Also Read:

What Will The Car Of 2040 Be Like?:

Guidance For Connected Vehicle Security:

 

 

« Are Children 'Bingeing' on Social Media?
Insiders Are The Cause Of Most Healthcare Breaches »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Security Innovation Network (SINET)

Security Innovation Network (SINET)

SINET is dedicated to building a cohesive, worldwide Cybersecurity community with the goal of accelerating innovation through collaboration.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Echo

Echo

Echo delivers secure cloud-native infrastructure through enterprise-grade clean container base images that integrate seamlessly into existing workflows.