{"id":4257,"date":"2016-09-29T17:26:59","date_gmt":"2016-09-29T22:26:59","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=4257"},"modified":"2016-10-06T09:08:47","modified_gmt":"2016-10-06T14:08:47","slug":"researchers-studying-ways-prevent-car-hacking","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/researchers-studying-ways-prevent-car-hacking\/","title":{"rendered":"Researchers Are Studying Ways to Prevent Car-Hacking"},"content":{"rendered":"<p>It&#8217;s no surprise that your phone might be hacked. But it might come as a shock that hackers could probably take control of your vehicle. That\u2019s a scary thought, but one that automakers are trying to block with the help of those who know best: the hackers themselves.<\/p>\n<p>In recent experiments, hackers took control of several vehicles to demonstrate how it easy it could be for them to gain access. Here, we\u2019ll talk about the experiments, and what you can learn from them to better secure your own vehicle.<\/p>\n<p><strong><a href=\"https:\/\/www.psafe.com\/en\/blog\/tell-android-hacked\/\" target=\"_blank\">Read More: How to Tell if Your Android Has Been Hacked<\/a><\/strong><\/p>\n<p><strong>What were the experiments?<\/strong><br \/>\nAutomotive hackers took control of a Ford Escape and a Toyota Prius. The hackers took control of the cars by breaching the car\u2019s security system software. They stopped and started engines, took over the steering and brake, and changed the speedometer readings \u2014 all virtually. In the Prius, for example, the hackers red-lined the engine, eventually forcing the car to stop.<\/p>\n<p>Today, computers control all of a car\u2019s major functions. Most cars have 50 to 80 computers \u2014 called electronic control units.<\/p>\n<p><strong>What was the response?<\/strong><br \/>\nThese hackers published a paper describing the methods and code they used to take control of the vehicles. The goal of the experiments was to open the conversation about the topic. The research paper described how they accessed and transmitted code by hacking into cars\u2019 networks.<\/p>\n<p><strong>What can you do to protect your vehicle?<\/strong><br \/>\nThe news, sadly, is you can\u2019t do much. Overall, most car security systems are mysterious. Other research teams have also conducted studies on how cars can be manipulated virtually \u2014 while ignoring driver controls. This could be a real concern to drivers \u2014 someone could take control of their car to crash it or otherwise maliciously manipulate it. The National Highway Traffic Safety Administration also opened a 12-member coalition to deal with increasing cyber threats against vehicles.<\/p>\n<p>While these threats could be a concern, you don\u2019t have much to worry about. Cases of cyber hacked cars are rare \u2014 if entirely unheard of outside of these experiments.<\/p>\n<p>We might not be able to secure your car, but we definitely can protect your phone from hackers. <strong><a href=\"https:\/\/www.psafe.com\/en\/antivirus-acelerador-limpeza-android\/total\/\" target=\"_blank\">PSafe Total\u2019s<\/a><\/strong> unmatched Anti-virus system scans your phone files and SD cards 24 hours a day to make sure hackers can\u2019t get hold of your information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Want to make sure your car doesn\u2019t get hacked? Hackers demonstrated how simple it is to commandeer control of a vehicle in a series of experiments.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[2523,2867,259,249],"class_list":["post-4257","post","type-post","status-publish","format-standard","hentry","category-security","tag-car","tag-car-hacking","tag-hackers","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/4257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=4257"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/4257\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=4257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=4257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=4257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}