{"id":16714,"date":"2018-03-09T08:00:03","date_gmt":"2018-03-09T13:00:03","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=16714"},"modified":"2022-04-28T08:57:14","modified_gmt":"2022-04-28T12:57:14","slug":"hackers-control-smart-car-automotive","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/hackers-control-smart-car-automotive\/","title":{"rendered":"Hackers Might be Able to Take Control of Your Smart Car"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We keep a close eye on our smartphones, computers, and other gadgets to ensure their digital security. If our devices are breached, we risk losing our valued privacy and subject ourselves to extortionists &#8212; those who will happily return stolen personal information in exchange for a monetary payment. But, what if it was much worse? What if our cars were subject to hackers who could take complete control? The threat is genuine, and it\u2019s growing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Journalists Jefferson Graham and Chris Woodyard <\/span><a href=\"https:\/\/www.freep.com\/story\/money\/2018\/01\/13\/car-hacking-threat\/1028270001\/\"><span style=\"font-weight: 400;\">recently spoke with the Director of California-based security company Green Hills Software<\/span><\/a><span style=\"font-weight: 400;\">, Joe Fabbre. In the trio\u2019s discussion, Fabbre commented on a scene from Hollywood blockbuster, \u201cThe Fate of the Furious,\u201d in which vehicle hacking was depicted:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThat\u2019s Hollywood sensationalizing it, but that is not really that far-fetched\u2026 there are very skilled hackers out there who can beat through a lot of medium and low levels of robustness in terms of security that is present in a lot of cars today.\u201d<\/span><\/p>\n<p><strong>Read More:\u00a0\u00a0<\/strong><a href=\"https:\/\/www.psafe.com\/en\/blog\/massive-global-cyberattack-ties-nsa\/\" target=\"_blank\" rel=\"noopener\">Massive Global Cyberattack Has Ties to the NSA<\/a><\/p>\n<p><span style=\"font-weight: 400;\">In recent years, automakers have become more conscious of security vulnerabilities that are now possible due to the increased number of computer systems found within cars. While no one has yet been killed due to an occurrence of vehicle hacking, cases have been noted where cars brakes and engine systems have been taken over remotely.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Back in 2015, <\/span><a href=\"https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/\"><span style=\"font-weight: 400;\">hackers were able to take control of a Jeep Cherokee<\/span><\/a><span style=\"font-weight: 400;\">, shutting its engines down on a local St. Louis highway. The incident prompted Fiat Chrysler to send out USB sticks to their drivers that contained software fixes to prevent the exploit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last year, for the second year in a row, a group of Chinese hackers was able to demonstrate a software exploit within a Tesla vehicle, allowing them to take control of a Model X\u2019s brake system, audio, and door systems. Luckily, these hackers were on our side, working to show the vulnerabilities in poorly secured software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While your next car may be equipped with computer systems exhibiting exploits, the real catastrophe is when we view the world of entirely autonomous vehicles &#8211; driving without the aid of human interaction. With self-driving cars, the threat becomes very real when cars begin sending signals amongst one another to communicate wirelessly to better understand the road ahead.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to whether or not you should be concerned &#8212; yes, you should keep yourself aware of the security threats present in emerging vehicle technology. However, automotive makers are working faster than ever, learning to deploy software updates that can be installed via your home WiFi or vehicle\u2019s cellular connection, to provide us with a safer future. For now, be sure to keep your hands on the wheel and your smart car updated.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the advancement of automotive technology, your next car might be as vulnerable to security attacks as your current computer or smartphone.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[6],"tags":[249,243],"class_list":["post-16714","post","type-post","status-publish","format-standard","hentry","category-privacy","tag-security","tag-technology"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=16714"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16714\/revisions"}],"predecessor-version":[{"id":17681,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16714\/revisions\/17681"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=16714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=16714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=16714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}