The increasing number of smart features built into cars is inevitably leading to serious potential security risks. Because connected cars are linked with the internet and its crucial systems are interconnected, hackers have the opportunity to mount a number of attacks at a distance.
As more automobile manufacturers release mobile apps that communicate with cars, these applications are quickly becoming a major target for malicious behavior. In one instance, security researchers were able to breach a popular electric car’s controls via a poorly secured app. All in all, more than 80% of Android and iOS apps experience cryptographic issues.
Keyless entry systems provide a new way new way to break into locked vehicles by intercepting communication between the vehicle and the mobile app or wireless key fob. For example, a ring of thieves in the UK hacked keyless apps to steal cars and commercial vehicles, demanding a hefty ransom for their return.
Today’s connected cars collect a significant amount of data and interface with multiple after-market devices. Financial information, personal trip information, location information and entertainment preferences are increasingly at risk of being accessed through a vehicle’s telematics or infotainment system.
Catastrophic incidents resulting in personal injury and lawsuits are closer than you think. Cybersecurity researchers have demonstrated they could control the braking and steering of a car by remotely hijacking the adaptive cruise control system.
While the proliferation of Internet-based connections in automobiles promises an era of heightened passenger convenience, it also presents significant cyber- and physical safety concerns.
Intertrust Connected Car Security White Paper
This white paper describes the potential threats in modern connected cars, the ways hackers attempt to tamper with the data and software, and what are the solutions to these threats. Finally, this paper will focus on Intertrust’s robust solution to protecting connected cars – a set of software tools that are intended to increase application-level security and render hacker attacks extremely difficult and expensive to execute.