Skip to main content

Security Nightmare of Driverless Cars

Security Nightmare of Driverless Cars



The fear of malicious actors taking control of glaring flaws in smart cars is on the rise. This threat is therefore considered to be one of the major technical challenges confronting the automotive industry today.
CAR MANUFACTURERS
Initially, car manufacturers were not very familiar with the cyber security community. From a hacker’s perspective, as more and more cars are connecting to the internet, the attack surface area increases drastically. 
Remote access to vehicles could be gained through vulnerabilities in the connected ecosystem. With the series of controlled hacking demonstrations on autonomous vehicles leading to discovery of fundamental flaws, companies are starting to notice the potential security threats. 
“Such incidents could demolish public confidence in autonomous vehicles overnight and undo years of costly research and development,” says Jan Mohr, who co-authored a research report on driverless cars.
For complete article visit: TripWire

Comments

Popular posts from this blog

Digital Dark Age: Information Explosion and Data Risks

“Old formats of documents that we’ve created or presentations may not be readable by the latest version of the software because backwards compatibility is not always guaranteed,” says Vint Cerf, Google’s Vice President and one the fathers of the Internet. Digital dark age  describes the belief that the rapid evolution of technology will eventually make storage formats obsolete, and data will not be accessible to generations to come. It’s easy to assume that the data we store will somehow be preserved forever. Vint Cerf calls this phenomenon as ‘ bit rot ‘. Evolution of Digital Storage Magnetic tape was the first storage medium that revolutionized the digital industry. It was first introduced in the year 1928. Over the years, magnetic tape can suffer from deterioration called  sticky-shed syndrome , caused by absorption of moisture into the binder of the tape, rendering the tape unusable. Storage of 1024 bits of information was successfully implemented in 1948 using electrostati

Purpose - WHY? + HOW? = SUCESS

The value of thinking about "WHY".... Benefits of asking "Why?" will help you in understanding what you are trying to accomplish. It defines success. It creates decision making criteria. It aligns resources. It motivates. It clarifies focus. It expands options. In order to reach our short term or long term goals, we have to analyze the purpose of the action to be performed. Purpose defines Success Lets jump on to the "How" part. Once we have gone through all the stages such as defining goals, aligning resources, clarifying focuses etc. Then comes the implementation. i.e We need to know how those resources and goals can be attained. We all are familiar with the most brilliant, complex and the creative planner in world: our brain. Knowingly or unknowingly we are in ourselves a planning machine. We are planning when we get dressed, go out for dinner or even talk. Human mind instantaneously plans and organizes actions.  For example: when

Difference Between Information Security and Cyber Security

I have been working the cybersecurity field for many years. I have come across people with different levels of technical knowledge, but very few possess the ability to explain a complex technical concept in simple terms. The funny part is, I have also seen people explaining simple concepts in the most complicated form. Understanding and correlating is the mother of all knowledge No technology remains fixed. Technology starts, develops, persists, mutates, stagnates, and declines. With the ever-growing advancement in technology, the amount of time a person spends in understanding the technology is comparatively lower. Gone are the days when children and teenagers would play around with breaking and reassembling toys. Today's children and teenagers spend most of their playtime on gadgets and social media platforms. The ability to break and reassemble things is slowly fading away from the younger generation. The education pattern in schools and colleges must be upgraded to compl