253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

Today’s cars are equipped with more complicated computer systems that allow users access to cutting-edge technology and services. Due to the increasing number of cyber attacks on computerized cars, Volkswagen has chosen to team up with three Israeli cybersecurity experts to equip advanced vehicles with the proper security solutions.

Ownership and investments made by both parties haven’t been made public yet, the new partnership has adopted the name Cymotive, and its goal is clear. Its chairman, Yuval Duskin, formerly sat at the helm of the Israeli Security Services, and said: “Together with Volkswagen we are building a top-notch team of cyber security experts. We are aware of the significant technological challenges that will face us in the next years in dealing with the cyber security threats facing the connected car and the development of the autonomous car."

It’s dangerous to assume that a hacker can’t get to you in your own car. Bluetooth connectivity and computerized dashboards have given criminals brand new ways to infiltrate connected cars. Researchers have recently discovered a way for an intruder to hack into Volkswagen vehicles using nothing but an inexpensive radio kit. This flaw affects vehicles sold since 2000, so there’s huge potential for this to cause trouble for millions of owners.

Volkswagen is far from being the only car manufacturer that produces systems that are at risk. Check out this YouTube video where two seasoned hackers use a laptop to control a Jeep Cherokee. They connected the laptop to the controller area network (or CAN bus) and were able to take complete control of the vehicle’s brakes. While this is a local hack, it could very well become a threat that could be controlled remotely.

Though the video seems proof enough that this trend is a problem, upon submitting their findings to Fiat Chrysler Automobiles--the manufacturer of the Jeep brand--their findings were swiftly dismissed as invalid and inappropriate, claiming that sharing “how-to information” could put the public at risk. They further claimed that the attack required considerable technical knowledge to use, and that the flaws had already been addressed.

Granted, hackers are always trying to find new vulnerabilities and exploits to test their mettle against. Whether it’s a vehicle computer or a corporate workstation, you can bet that in the near future hackers will find ways to infiltrate and exploit them. This race won’t end anytime soon, so it looks like hackers and cyber security professionals will be trapped in an endless cycle of hack or be hacked.

Will your next automotive purchase include a computerized system, or would you rather keep it simple? Let us know in the comments.

Tip of the Week: Access Old Clipboard Content With...
Do Memes Have a Place in the Professional Business...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 25 July 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Innovation Small Business Business Computing Malware Alert Backup Google Efficiency Ransomware Hackers Social Media Internet Microsoft Software Smartphones Hardware Managed IT Services Operating System How To Private Cloud Hosted Solutions Public Cloud Cybercrime Google Drive Data Data Breach Server Law Enforcement Windows 10 Social Engineering Saving Money Productivity App Email Business Management Computers Windows User Tips Root Cause Analysis Cybersecurity Automation Managed Service Provider BYOD IT Consultant Spam Blocking Android Meetings Samsung Health Business Gadgets Physical Security Leadership Windows 10s Data Backup Chrome Files Mobile Device Management Data Security Phishing Hybrid Cloud Vulnerability Outsourced IT Data loss History Safety Hiring/Firing HBO webinar Network Solid State Drive Managed IT Services Business Continuity The Internet of Things Screen Mirroring Bandwidth Money Browser Employer-Employee Relationship Passwords Conferencing Router Audit Collaboration Government Upgrade Cast Networking User Error Miscellaneous Marketing Emails Computer Fan Bring Your Own Device Data Storage Supercomputer Wi-Fi Office Netflix Network Security FENG Telephone Systems Quick Tips Computer IT Management BDR Internet Exlporer Relocation IT Support Facebook Windows 10 Apple IBM IT Plan Current Events End of Support Productivity Humor OneNote Save Money iPhone Spam Unsupported Software Knowledge Internet exploMicrosoft Flexibility Settings Downtime Budget Software Tips Network Congestion Advertising

Blog Archive

Newsletter Sign Up