Ways

Daimler’s trucks, luxury cars to go their separate ways

title=s

Daimler AG’s corporate headquarters reflected in a window in Stuttgart, Germany, Thursday, Sept. 30, 2021. Shareholders in Daimler AG, maker of Mercedes-Benz luxury cars, have an extraordinary online meeting Friday, Oct. 1, 2021, on the spinoff of the company’s truck business. (Marijan Murat/dpa via AP)

AP

Shareholders in Daimler AG, maker of Mercedes-Benz luxury cars, on Friday approved the spinoff of the company’s truck division, a move intended to let the world’s largest maker of trucks react faster to change and focus on the new low-emission technologies transforming the automotive industry.

The voting at an online shareholder meeting also means that Stuttgart-based Daimler will rename itself as Mercedes-Benz Group AG as of Feb. 1, 2022.

Daimler CEO Ola Kallenius said that “by unlocking the full potential of both companies, we are establishing two undisputed innovation leaders who will set the pace in the transformation of their

Read More

4 Ways Your Car Can Be Hacked and How to Prevent It

It might sound like something out of a sci-fi movie, but it’s a scenario that is swiftly becoming a reality. Cybercriminals are finding ways to bypass your automotive security defenses and hack into your vehicles.

It doesn’t come as a surprise though, because modern cars are essentially computers on wheels. They are loaded with embedded electronic control units (ECUs) that monitor and control core vehicle functions, including the navigation, steering, brakes, entertainment, and the engine itself.

So how can hackers control your car? And how do you protect your vehicle from these criminals?

Automotive Cybersecurity and the Threat Landscape

Automotive cybersecurity is a branch of computer security focused on risks related to vehicles. The National Highway Traffic Safety Administration defines it as:

Cybersecurity, within the context of road vehicles, is the protection of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data from malicious attacks, damage,

Read More