Hacking The IOT: Auto Industry Lacks Security

When security researchers Charlie Miller and Chris Valasek studied the technical configuration of 20 new car models, they found a recurring high security risk design flaw.

Models by Cherokee, Cadillac, and Toyota were deemed the most “hackable.” Mill and Valasek found that in these highly computerized environments, bluetooth, telematics, and OnStar all share the same network as vital engine controls. This means that brakes, tire pressure monitoring, and even steering are potentially vulnerable to attack from hackers who tap into a car’s local internet. If a malicious virus were to be implanted into a system like this one, repercussions could be disastrous for drivers. 

With an increasing number of networked devices sharing information in home automation, wearables, automobile electronics, and more, it is becoming evident that developers of the IOT need to take increased precaution when designing their communication architecture. For integrated APIs, this means heightening encryption and authentication processes. With explosive growth slated for internet connectivity, secure API management in this field is more relevant than ever.

Original Article

How hackers could slam on your car's brakes

Bill Doerrfeld I am a consultant that specializes in API economy research & content creation for developer-centric programs. I study Application Programming Interfaces (APIs) and related tech and develop content [eBooks, blogs, whitepapers, graphic design] paired with high-impact publishing strategies. I live and work in Seattle, and spend most of my time as Editor in Chief for Nordic APIs, a blog and knowledge center for API providers. For a time I was a Directory Manager & Associate Editor at ProgrammableWeb, and still add new APIs to the directory every now and then. Drop me a line at bill@doerrfeld.io. Let's connect on Twitter at @DoerrfeldBill, or follow me on LinkedIn.