We just finished up our visit to the Connected Car Expo in LA this week and it was a great success. Leading automotive manufacturers and suppliers today are turning to us and our security solutions to secure mobile apps that control cars. Smartphone apps are used for automated steering, parking, braking and other driving functions that all require a high level of security for safety and privacy, and for protection against hacking.
As cars become more connected, devices and applications that help the cars stay connected introduce vulnerabilities, data leaks and privacy breaches. The diversity of connected devices puts pressure on both car manufacturers and users. Our software-based solution secures the connected car at both the manufacturer and user levels with a combination of two security components – Cryptanium Code Protection (software application hardening) and Cryptanium Secure Key Box (white-box cryptography).
A recent Telefonica Business Solutions blog – Safe Big Data Drives the Future of Connected Car – highlights the need for security rather succinctly.
…connected cars securing access to core driver data is a top priority that everyone in the automotive business has understood and is quickly addressing “imagine driving down the highway at 70 miles per hour, when suddenly the wheel turns hard right. You crash. And it was because someone hacked your car. It’s not far-fetched science fiction. It’s the near-term future today’s hackers are warning about”.
Cryptanium Code Protection and Secure Key Box not only protect the driver from data breaches or worse – the takeover of vital automobile controls – but also protect the manufacturer from potential damaging brand attention or lawsuit. For manufacturers, Cryptanium secures the car operation, including over-the-air (OTA) software updates, navigation, diagnostics system, vehicle data, speed and driving habits, as well as infotainment data and apps integrity. For users, Cryptanium protects mobile applications that are responsible for vehicle locks/unlocks; remote starts, steering and braking; vehicle status; authentication and other vehicle communications functions that would otherwise lead to vulnerabilities and security risks.