Hacking The IOT: Auto Industry Lacks Security

When security researchers Charlie Miller and Chris Valasek studied the technical configuration of 20 new car models, they found a recurring high security risk design flaw.

Models by Cherokee, Cadillac, and Toyota were deemed the most “hackable.” Mill and Valasek found that in these highly computerized environments, bluetooth, telematics, and OnStar all share the same network as vital engine controls. This means that brakes, tire pressure monitoring, and even steering are potentially vulnerable to attack from hackers who tap into a car’s local internet. If a malicious virus were to be implanted into a system like this one, repercussions could be disastrous for drivers. 

With an increasing number of networked devices sharing information in home automation, wearables, automobile electronics, and more, it is becoming evident that developers of the IOT need to take increased precaution when designing their communication architecture. For integrated APIs, this means heightening Encryption and Authentication processes. With explosive growth slated for internet connectivity, secure API management in this field is more relevant than ever.

Be sure to read the next Auto article: Maximize Holiday Fuel Economy With .Gov Tool

Original Article

How hackers could slam on your car's brakes