This software wants to protect your connected car from IoT hacking
Trend Micro and Microsoft aim their sights at connected car hackers
Software targeting smart car hacking threats was showcased at Microsoft's IoT Expo in Taipei this week.
The as-yet unnamed software development kit, designed by cybersecurity firm Trend Micro and Microsoft, aims to bring cybersecurity in line with the Internet of Things (IoT), by protecting vehicles against cloud and network-related threats.
An endpoint-level protection system activates security when connected cars are under attack, as well as detecting threats and conducting periodic risk assessments.
The tool also connects users to Trend Micro's Smart Protection Network and inspects smart vehicles' systems for anomalous security conditions, through the use of machine learning.
In a report, Trend Micro found 50% of surveyed organisations observed an increased frequency of security threats, while 80% agreed that attacks had become more sophisticated.
As new firms like Tesla and traditional carmakers like BMW turn their attention to connected cars, cyber attacks targeting such machines are fast becoming a problem. The FBI warned that vehicles are "increasingly vulnerable" to hacking in March, and Volkswagen hired an entire security team for its connected cars last month.
Jerry Liao, chief architect of IoT security at Trend Micro said: "There is a huge need for improved 'internet of vehicles' security, and this new kit demonstrates Trend Micro's dedication to protecting its customers, as well as our proactive - not reactive - approach to security."
Gartner predicts that, by 2020, 20.8 billion connected devices will be in use worldwide. Jim Tully, vice president at Gartner said: "IoT services are the real driver of value in IoT, and increasing attention is being focused on new services by end-user organisations and vendors."
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now