This software wants to protect your connected car from IoT hacking

Trend Micro and Microsoft aim their sights at connected car hackers

Software targeting smart car hacking threats was showcased at Microsoft's IoT Expo in Taipei this week.

The as-yet unnamed software development kit, designed by cybersecurity firm Trend Micro and Microsoft, aims to bring cybersecurity in line with the Internet of Things (IoT), by protecting vehicles against cloud and network-related threats.

An endpoint-level protection system activates security when connected cars are under attack, as well as detecting threats and conducting periodic risk assessments.

The tool also connects users to Trend Micro's Smart Protection Network and inspects smart vehicles' systems for anomalous security conditions, through the use of machine learning.

Advertisement - Article continues below

In a report, Trend Micro found 50% of surveyed organisations observed an increased frequency of security threats, while 80% agreed that attacks had become more sophisticated.

As new firms like Tesla and traditional carmakers like BMW turn their attention to connected cars, cyber attacks targeting such machines are fast becoming a problem. The FBI warned that vehicles are "increasingly vulnerable" to hacking in March, and Volkswagen hired an entire security team for its connected cars last month.

Jerry Liao, chief architect of IoT security at Trend Micro said: "There is a huge need for improved 'internet of vehicles' security, and this new kit demonstrates Trend Micro's dedication to protecting its customers, as well as our proactive - not reactive - approach to security."

Gartner predicts that, by 2020, 20.8 billion connected devices will be in use worldwide. Jim Tully, vice president at Gartner said: "IoT services are the real driver of value in IoT, and increasing attention is being focused on new services by end-user organisations and vendors."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now



Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019

Five signs that it’s time to retire IT kit

29 Nov 2019
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019