KASHIMAWO (@boboskylarme) 21 февраля 2019 / ** / / ** / Carabao финал Кубка в прямом эфире на talkSPORT Челси Манчестер Сити жить на talkSPORT в 4:30 вечера в воскресенье, 24 февраля " " Арсенал перед окном передачи «огромный» летом, в которых они должны «улучшить во всех отделах», в соответствии с легендой клуба Ли Диксона.
Chinese IoT security experts from Keen Security Lab in Shanghai once again unveiled the potential threats of connected vehicles. The team was able to hack into an autonomous technology vehicle designed and developed by Tesla for the second consecutive year.
The team used the vehicles in-car browser to run malicious code. Once the system was exploited, the researchers could open the doors and trunk of the vehicle, adjust the brightness of headlamps, use the vehicles audio system, and even put the brakes remotely.
And here is a big fact – Tesla was amongst the automobile company with the highest security protocols.
Recently, Tesla made a statement that any team of researchers able to detect and prevent possible cyber threats will be handsomely rewarded. To its credit, the team from China notified Tesla about the vulnerabilities and the company patched the exposures within two weeks.
The team also confirmed that Tesla was not the only automobile company prone to hackers. In fact, there are dozens of other companies who bear weak security systems in comparison to Tesla. In the last few years, many other car manufacturers have been subject to hacks including Chrysler, Mitsubishi, and Chevy.
Though connected cars are taking hype, the technology is not yet secured. And with life-threatening threats, the casualties caused by a single system hack can be devastating.
The team has proposed a legislation act called ‘Security and Privacy in Your car’ (SPY). They believe that it can be a major legislative milestone is securing autonomous/connected vehicles. The act aims to mitigate the hacks and increase data privacy standards.
Automotive & Transportation Industry Analyst, Frost & Sullivan states “The industry is constantly evolving, and vehicle vulnerabilities are increasing. With no proven vulnerability tracking, all connected vehicles are vulnerable. The hacker needs to be right only once; automakers need to be right 100% of the time.”
Most connected car manufacturers still consider security as the secondary factor. But, it is the primary aspect that determines the customer’s purchasing decision. Hence, it is more than important for automakers to collaborate with security solution providers to become educated, and implement a holistic approach and set standards for connected vehicles.