Hacking The IOT: Auto Industry Lacks Security

When security researchers Charlie Miller and Chris Valasek studied the technical configuration of 20 new car models, they found a recurring high security risk design flaw.

Models by Cherokee, Cadillac, and Toyota were deemed the most “hackable.” Mill and Valasek found that in these highly computerized environments, bluetooth, telematics, and OnStar all share the same network as vital engine controls. This means that brakes, tire pressure monitoring, and even steering are potentially vulnerable to attack from hackers who tap into a car’s local internet. If a malicious virus were to be implanted into a system like this one, repercussions could be disastrous for drivers. 

With an increasing number of networked devices sharing information in home automation, wearables, automobile electronics, and more, it is becoming evident that developers of the IOT need to take increased precaution when designing their communication architecture. For integrated APIs, this means heightening encryption and authentication processes. With explosive growth slated for internet connectivity, secure API management in this field is more relevant than ever.

Original Article

How hackers could slam on your car's brakes

Bill Doerrfeld is an API specialist covering the API economy, specializing in evergreen content and evangelism for developer programs. He is the Editor in Chief for Nordic APIs, and formerly Directory Manager & Associate Editor at ProgrammableWeb. Drop him a line at bill@nordicapis.com. Connect to Bill on Twitter at @DoerrfeldBill, put him in a Google+ circle, or follow him on LinkedIn.