Self-Driving Car Poses High Hacking Risk

While major auto companies are working on introducing the futuristic self-driving technology in cars soon, this threatens to open new security problems for them as hackers have sensed an opportunity here, a researcher has predicted.

"We are a long way from securing the non-autonomous vehicles, let alone the autonomous ones," said Stefan Savage, computer science professor at the University of California-San Diago, in MIT Technology Review.

Pointing out security flaws to car companies which are into driverless car technology, the researcher said that extra computers, sensors and improved Internet connectivity required to make a car drive on its own increase the possible weak points.

Tech giant Google is working on autonomous cars as part of Google X project to develop technology for mainly electronic cars. The software installed in Google's cars is called Google Chauffeur.

Recently, with the help from Nasa space technology, automaker Nissan successfully test-drove its all-electric, driverless car at Nasa's Ames Research Centre in California.

Swedish automobile giant Volvo is also developing intelligent high bandwidth streaming capabilities in collaboration with Ericsson's cloud expertise and network to create a highway full of autonomous cars.

Tesla Motors, an American automotive and energy storage company, is also serious about self-driving car tech and hired processor design veteran Jim Keller to lead its autopilot hardware engineering team.

How does this technology work? The self-driving cars, or prototypes, rely on sensors to determine the surroundings and objects like pedestrians, cyclists and other vehicles around it.

The software assisting the sensors then decides the speed and trajectory to drive safely.

How is this technology a threat to security? Savage said that it is possible to take control of conventional vehicles in various ways, for example by dialing into a car's built-in cellular connection or by giving a driver a music CD that makes the car connect to an attacker's computer.

Once inside the system, the hackers can take control of the brakes, engine or other components of a person's car remotely.

The developers are still not able to isolate these "important" parts of the car because everything must be connected to enable many functions people expect of cars.

This is also owing to the fact that carmakers do not know exactly what software is inside the vehicles they sell because the third-party suppliers guard the details of the software inside, things like the brake-control system or central locking components.

NDTV: http://bit.ly/1UE4wPu

« How to Recover From The Hack Nightmare
TalkTalk's Cybersecurity Lesson »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

ThreatCaptain

ThreatCaptain

ThreatCaptain is a Cybersecurity Leadership Development Company driven to enhance and illuminate cybersecurity risk through strategic alignment and informed business decision-making.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

The Missing Link

The Missing Link

Whether your requirements are large or small, The Missing Link have you covered with our core offerings including IT & Cloud, Cyber Security and Automation.