This software wants to protect your connected car from IoT hacking

Trend Micro and Microsoft aim their sights at connected car hackers

Software targeting smart car hacking threats was showcased at Microsoft's IoT Expo in Taipei this week.

The as-yet unnamed software development kit, designed by cybersecurity firm Trend Micro and Microsoft, aims to bring cybersecurity in line with the Internet of Things (IoT), by protecting vehicles against cloud and network-related threats.

Advertisement - Article continues below

An endpoint-level protection system activates security when connected cars are under attack, as well as detecting threats and conducting periodic risk assessments.

The tool also connects users to Trend Micro's Smart Protection Network and inspects smart vehicles' systems for anomalous security conditions, through the use of machine learning.

In a report, Trend Micro found 50% of surveyed organisations observed an increased frequency of security threats, while 80% agreed that attacks had become more sophisticated.

As new firms like Tesla and traditional carmakers like BMW turn their attention to connected cars, cyber attacks targeting such machines are fast becoming a problem. The FBI warned that vehicles are "increasingly vulnerable" to hacking in March, and Volkswagen hired an entire security team for its connected cars last month.

Jerry Liao, chief architect of IoT security at Trend Micro said: "There is a huge need for improved 'internet of vehicles' security, and this new kit demonstrates Trend Micro's dedication to protecting its customers, as well as our proactive - not reactive - approach to security."

Advertisement
Advertisement - Article continues below

Gartner predicts that, by 2020, 20.8 billion connected devices will be in use worldwide. Jim Tully, vice president at Gartner said: "IoT services are the real driver of value in IoT, and increasing attention is being focused on new services by end-user organisations and vendors."

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020