Researchers warn of connected car hacking dangers

Hi-tech vehicles could be at increased risk from hackers, researchers warn

BMW car

Researchers have issued a warning to drivers about some of the security risks inherent to modern hi-tech cars.

Computer systems inside these modern vehicles have raised serious concerns regarding hackers, reports BBC News, with remote hacking now a significant danger for smart, connected vehicles.

Security researcher Josh Corman told the site: "Cars today are not just computers on wheels. They are networks of computers on wheels."

Corman warns that the 200 ECUs embedded in these cars all connect to a network that has the potential to be accessed remotely for nefarious purposes.

These systems of computers are made by third-party manufacturers rather than the car makers themselves, and researchers have been looking into how they work.

Upon inspection, various security flaws have been found, with 21 individual vehicles tested and the results presented at the Def Con hacker conference in Las Vegas.

Andy Davis, head of research at NCC Group, said: "If you can get access to that Can [Controller Area Network] either physically or remotely you can essentially control the vehicle."

Davis has also predicted that connected cars will soon be the norm, and security measures must be improved accordingly.

The 2014 Jeep Cherokee was found to be the most flawed, though Chrysler, the car's maker, played down claims by citing the lack of "real-world incidents of remote hacking" on record.

"We have a team of engineers dedicated to developing cyber-security features in anticipation of emerging threats," the manufacturer added. "Further, Chrysler Group strongly supports the responsible disclosure protocol for addressing cybersecurity."

Featured Resources

2021 Thales cloud security study

The challenges of cloud data protection and access management in a hybrid and multi cloud world

Free download

IDC agility assessment

The competitive advantage in adaptability

Free Download

Digital transformation insights from CIOs for CIOs

Transformation pilotes, co-pilots, and engineers

Free download

What ITDMs did next - and what they should be doing now

Enable continued collaboration and communication for hybrid workers

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
Australia film archive gets $41.9 million to digitise audiovisual heritage
digitisation

Australia film archive gets $41.9 million to digitise audiovisual heritage

6 Dec 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021