This software wants to protect your connected car from IoT hacking

Trend Micro and Microsoft aim their sights at connected car hackers

Software targeting smart car hacking threats was showcased at Microsoft's IoT Expo in Taipei this week.

The as-yet unnamed software development kit, designed by cybersecurity firm Trend Micro and Microsoft, aims to bring cybersecurity in line with the Internet of Things (IoT), by protecting vehicles against cloud and network-related threats.

An endpoint-level protection system activates security when connected cars are under attack, as well as detecting threats and conducting periodic risk assessments.

The tool also connects users to Trend Micro's Smart Protection Network and inspects smart vehicles' systems for anomalous security conditions, through the use of machine learning.

Advertisement - Article continues below
Advertisement - Article continues below

In a report, Trend Micro found 50% of surveyed organisations observed an increased frequency of security threats, while 80% agreed that attacks had become more sophisticated.

As new firms like Tesla and traditional carmakers like BMW turn their attention to connected cars, cyber attacks targeting such machines are fast becoming a problem. The FBI warned that vehicles are "increasingly vulnerable" to hacking in March, and Volkswagen hired an entire security team for its connected cars last month.

Jerry Liao, chief architect of IoT security at Trend Micro said: "There is a huge need for improved 'internet of vehicles' security, and this new kit demonstrates Trend Micro's dedication to protecting its customers, as well as our proactive - not reactive - approach to security."

Gartner predicts that, by 2020, 20.8 billion connected devices will be in use worldwide. Jim Tully, vice president at Gartner said: "IoT services are the real driver of value in IoT, and increasing attention is being focused on new services by end-user organisations and vendors."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now


internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020
General Data Protection Regulation (GDPR)

Data protection fines hit £100m during first 18 months of GDPR

20 Jan 2020