Hacked

Cars are packed with technology, but they can still be hacked

The threat to people’s lives is terrifying, so auto manufacturers need to change their old-school strategies to protect people.

TechRepublic’s Karen Roby spoke with Eric Sivertson and J.P. Singh of Lattice, a human resources platform, about cyberattacks in cars. The following is an edited transcript of their conversation.

Karen Roby: Car manufacturers are at a crossroads, as they’re trying to deliver the features that customers want, while keeping safety and security. Lattice recently held a webinar to discuss these safety and security issues. Eric, I’ll start with you. Before we started recording, we were talking about the old guard is out. Things are changing, and it’s so important when it comes to cars that we keep up with security, because the thought of someone being able to just take over a car remotely, it’s a pretty scary thought.

SEE: Security incident response policy (TechRepublic Premium)

Eric Sivertson: What’s happened in

Read More

4 Ways Your Car Can Be Hacked and How to Prevent It

It might sound like something out of a sci-fi movie, but it’s a scenario that is swiftly becoming a reality. Cybercriminals are finding ways to bypass your automotive security defenses and hack into your vehicles.

It doesn’t come as a surprise though, because modern cars are essentially computers on wheels. They are loaded with embedded electronic control units (ECUs) that monitor and control core vehicle functions, including the navigation, steering, brakes, entertainment, and the engine itself.

So how can hackers control your car? And how do you protect your vehicle from these criminals?

Automotive Cybersecurity and the Threat Landscape

Automotive cybersecurity is a branch of computer security focused on risks related to vehicles. The National Highway Traffic Safety Administration defines it as:

Cybersecurity, within the context of road vehicles, is the protection of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data from malicious attacks, damage,

Read More