Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

What Volkswagen is Doing to Prevent Hackers From Controlling Your Car

Today’s cars are equipped with more complicated computer systems that allow users access to cutting-edge technology and services. Due to the increasing number of cyber attacks on computerized cars, Volkswagen has chosen to team up with three Israeli cybersecurity experts to equip advanced vehicles with the proper security solutions.

Ownership and investments made by both parties haven’t been made public yet, the new partnership has adopted the name Cymotive, and its goal is clear. Its chairman, Yuval Duskin, formerly sat at the helm of the Israeli Security Services, and said: “Together with Volkswagen we are building a top-notch team of cyber security experts. We are aware of the significant technological challenges that will face us in the next years in dealing with the cyber security threats facing the connected car and the development of the autonomous car."

It’s dangerous to assume that a hacker can’t get to you in your own car. Bluetooth connectivity and computerized dashboards have given criminals brand new ways to infiltrate connected cars. Researchers have recently discovered a way for an intruder to hack into Volkswagen vehicles using nothing but an inexpensive radio kit. This flaw affects vehicles sold since 2000, so there’s huge potential for this to cause trouble for millions of owners.

Volkswagen is far from being the only car manufacturer that produces systems that are at risk. Check out this YouTube video where two seasoned hackers use a laptop to control a Jeep Cherokee. They connected the laptop to the controller area network (or CAN bus) and were able to take complete control of the vehicle’s brakes. While this is a local hack, it could very well become a threat that could be controlled remotely.

Though the video seems proof enough that this trend is a problem, upon submitting their findings to Fiat Chrysler Automobiles--the manufacturer of the Jeep brand--their findings were swiftly dismissed as invalid and inappropriate, claiming that sharing “how-to information” could put the public at risk. They further claimed that the attack required considerable technical knowledge to use, and that the flaws had already been addressed.

Granted, hackers are always trying to find new vulnerabilities and exploits to test their mettle against. Whether it’s a vehicle computer or a corporate workstation, you can bet that in the near future hackers will find ways to infiltrate and exploit them. This race won’t end anytime soon, so it looks like hackers and cyber security professionals will be trapped in an endless cycle of hack or be hacked.

Will your next automotive purchase include a computerized system, or would you rather keep it simple? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Phishing Windows Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Passwords Windows 10 Tech Term Chrome Virtualization Social Media Saving Money Holiday Gadgets Microsoft Office Automation Managed IT Services Managed Service Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Wi-Fi BYOD Mobile Device Management Health Networking Internet of Things IT Support Remote Spam Office 365 Telephone Systems Covid-19 Information Technology Information Managed Service Provider Alert Social Engineering Mobility Router Employer-Employee Relationship Recovery Bandwidth BDR Big Data Remote Monitoring Password Money Data Breach Encryption App History Mobile Computing Applications Application Law Enforcement Human Resources Managed IT Mobile Office Data Storage Patch Management Apps Office Tips Training VPN Blockchain Government Paperless Office How To Private Cloud Remote Computing Voice over Internet Protocol HaaS Bring Your Own Device Data Management Work/Life Balance Vulnerability Windows 7 Word Flexibility Marketing Servers WiFi Wireless IT solutions Google Drive Entertainment Website Budget Gmail Data Security Settings Avoiding Downtime Two-factor Authentication Mouse Infrastructure User Error Conferencing Meetings Cleaning Scam Vendor Data Protection Managed Services End of Support Risk Management Display Hacker Physical Security Education Vendor Management Safety The Internet of Things HIPAA Sports Lithium-ion battery Employee/Employer Relationship Redundancy USB Keyboard RMM Staff Software as a Service Firewall Telephone System Machine Learning Connectivity Virtual Reality Remote Work Apple Save Time Social Data storage Net Neutrality Workplace Strategy Automobile Help Desk Augmented Reality Printing Computing Infrastructure Fraud Virus Wearable Technology Business Intelligence Going Green Remote Worker Retail Hard Drives Managed Services Provider Audit Instant Messaging Worker Unified Threat Management Excel Computer Accessories IT Management Cryptocurrency Robot Database Battery Botnet Shadow IT Biometrics Legal Remote Workers IT Plan Virtual Desktop Comparison Processor Internet Exlporer CES Printer DDoS Unsupported Software Bluetooth PDF SharePoint Hard Drive Charger Content Management Business Technology Access Control Compliance OneNote Proactive IT Computer Care Customer Service Current Events Computing Virtual Assistant Telephony IT Consultant Authentication Best Practice Environment YouTube Samsung Fax Server Black Market Humor Value Digital Signage Update SaaS Document Management Spam Blocking Electronic Medical Records Solid State Drive Wireless Technology Downtime Google Docs How to Network Congestion Hiring/Firing Identity Theft eWaste Procurement Tip of the week MSP WIndows 7 webinar Accountants Tablets Emergency Social Network Professional Services Microchip Colocation Investment Public Cloud Thought Leadership Uninterrupted Power Supply Entrepreneur Employer Employee Relationship Credit Cards Assessment Password Manager Employees Employee/Employer Relationships Password Management Windows Server 2008 Monitor Shortcut ISP Multi-Factor Security Windows 365 Video Conferencing Tools Search Engine ROI Twitter Cost Management Television Business Mangement Sales Bitcoin NIST Social Networking Shortcuts Personal Reputation User Cryptomining Smart Tech Streaming Media PowerPoint Trending Windows Media Player Point of Sale Content Supply Chain Management Addiction Tech Support Amazon Public Computer Recycling Monitoring Techology Running Cable Batteries Laptop Digitize Regulations Wiring Customers Managing Stress Practices Memory Transportation Windows 8.1 Audiobook Windows Server 2008 R2 Computer Fan Cache Rootkit Amazon Web Services Criminal Cameras Customer relationships Safe Mode Touchpad IT Assessment GDPR Manufacturing Workers Hosted Computing Benefits Email Best Practices Politics Advertising FENG Wireless Internet Online Shopping Security Cameras IBM Science Computer Tips Managed IT Service File Sharing OneDrive Flash Camera Biometric Security Inventory Notifications Smart Technology Specifications Virtual CIO Peripheral Wire Evernote Customer Relationship Management Supercomputer Printer Server Travel Digital Security Cameras Distributed Denial of Service Using Data Software Tips Copiers Sync Printers Relocation 5G Emails Analyitcs Millennials Quick Tip Smart Office Programming Wireless Charging Smartwatch Ergonomics Video Games Development Virtual Private Network OLED Netflix Two Factor Authentication Workforce Worker Commute Experience PCI DSS Antivirus Virtual Machine Root Cause Analysis Cables Employee Knowledge Windows 8 Music 2FA Scalability Fiber Optics HBO Business Owner Messaging Skype Project Management IT service Cabling Nanotechnology Telecommuting Policy Hypervisor Data loss NarrowBand Cortana Leadership Digital Signature Tablet Troubleshooting Dark mode Search Trend Micro Outlook SMS Start Menu Warranty iPhone Domains Default App Procedure Saving Time Screen Mirroring HVAC Consultant Loyalty Google Apps Maintenance Google Search Analysis Analytics Books dark theme IaaS Shopping Frequently Asked Questions AI Mobile Administrator Files IT Infrastructure Windows 10s Devices Bloatware FinTech Cast Enterprise Content Management Chromecast Best Available Bing

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code