Researchers warn of connected car hacking dangers

Hi-tech vehicles could be at increased risk from hackers, researchers warn

BMW car

Researchers have issued a warning to drivers about some of the security risks inherent to modern hi-tech cars.

Computer systems inside these modern vehicles have raised serious concerns regarding hackers, reports BBC News, with remote hacking now a significant danger for smart, connected vehicles.

Security researcher Josh Corman told the site: "Cars today are not just computers on wheels. They are networks of computers on wheels."

Corman warns that the 200 ECUs embedded in these cars all connect to a network that has the potential to be accessed remotely for nefarious purposes.

These systems of computers are made by third-party manufacturers rather than the car makers themselves, and researchers have been looking into how they work.

Upon inspection, various security flaws have been found, with 21 individual vehicles tested and the results presented at the Def Con hacker conference in Las Vegas.

Andy Davis, head of research at NCC Group, said: "If you can get access to that Can [Controller Area Network] either physically or remotely you can essentially control the vehicle."

Davis has also predicted that connected cars will soon be the norm, and security measures must be improved accordingly.

The 2014 Jeep Cherokee was found to be the most flawed, though Chrysler, the car's maker, played down claims by citing the lack of "real-world incidents of remote hacking" on record.

"We have a team of engineers dedicated to developing cyber-security features in anticipation of emerging threats," the manufacturer added. "Further, Chrysler Group strongly supports the responsible disclosure protocol for addressing cybersecurity."

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020