#1 Trending Cyber Security News & Magazine
Saturday, June 10, 2023
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Google Secure AI Framework

    Google Secure AI Framework and the Greater Issue of AI Safety and Regulations

    LockBit Threatens to Publish Data Stolen From Cortina Watch Cyber Attack

    LockBit Threatens to Publish Data Stolen From Cortina Watch Cyber Attack

    OneDrive outage

    Microsoft Hacked? OneDrive Services Disrupted, Anonymous Sudan Claims Responsibility

    Critical Vulnerabilities in VMware Aria Operations for Networks Spotted; Patch Issued

    Critical Vulnerabilities in VMware Aria Operations for Networks Spotted; Patch Issued

    DEVILS SEC Joins KILLNET

    Ukraine at Risk: DEVILS SEC Joins KILLNET in Support of Russia

    Severity Vulnerabilities in Mozilla

    High Severity Vulnerabilities in Mozilla Fixed, Update Now!

    NoName Hacker Group

    NoName Hacker Group Sets Sights on Swiss Parliament and SSG in Cyber Assault

    Google Chromium vulnerability

    Have Your Patched This Google Chromium Vulnerability Yet?

    Operation OpSweden

    When Hackers Take the Bait: ‘Sex Championship’ Ruse Sparks Operation OpSweden

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Martin Sloan, Five Years Of GDPR

    Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    StopRansomware Guide

    Updated StopRansomware Guide Warns of Ransomware’s Shape Shifting Tactics

    Microsoft Entra

    Microsoft Build 2023: Microsoft Entra Introduced With New Identity and Access Features

    Data Protection Commission

    Irish Data Protection Commission imposes $1.3bn Fine on Meta

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    disclosing cybersecurity incidents

    Why Victims Fail to Disclose Cybersecurity Incidents, And Why They Should

    Stakeholder Communication During Crisis

    Stakeholder Communication During Crisis: How to Get It Right

    Government Regulation of AI businesses

    Government Regulation of AI businesses: UK Competition Watchdog Launches Review

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Billtrust Appoints Ankur Ahuja

    Billtrust Appoints Ankur Ahuja as SVP and Chief Information Security Officer

    Cybertech Africa

    Cybertech Africa: The Pan-African Event for Innovation and Networking

    IBM Acquired Polar Security

    IBM Acquires Polar Security Reportedly For $60 Million

    World CyberCon Middle East 2023

    World CyberCon Middle East 2023: The Premier Cybersecurity Conference in the Region

    ODIN by Cyble

    Cyble Launches ODIN: A Revolutionary Tool for Unparalleled Internet Exploration

    cybersecurity investments

    Cybersecurity Investments Up in April, Market Watchers Predict Growth of Over $700 billion

    OilRig APT

    Experts Warn of Increased IT Supply Chain Attacks by OilRig APT in Middle East

    World Password Day 2023

    World Password Day 2023: Protect Your Password, Create an Unbreakable One

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
SUBSCRIBE
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    Google Secure AI Framework

    Google Secure AI Framework and the Greater Issue of AI Safety and Regulations

    LockBit Threatens to Publish Data Stolen From Cortina Watch Cyber Attack

    LockBit Threatens to Publish Data Stolen From Cortina Watch Cyber Attack

    OneDrive outage

    Microsoft Hacked? OneDrive Services Disrupted, Anonymous Sudan Claims Responsibility

    Critical Vulnerabilities in VMware Aria Operations for Networks Spotted; Patch Issued

    Critical Vulnerabilities in VMware Aria Operations for Networks Spotted; Patch Issued

    DEVILS SEC Joins KILLNET

    Ukraine at Risk: DEVILS SEC Joins KILLNET in Support of Russia

    Severity Vulnerabilities in Mozilla

    High Severity Vulnerabilities in Mozilla Fixed, Update Now!

    NoName Hacker Group

    NoName Hacker Group Sets Sights on Swiss Parliament and SSG in Cyber Assault

    Google Chromium vulnerability

    Have Your Patched This Google Chromium Vulnerability Yet?

    Operation OpSweden

    When Hackers Take the Bait: ‘Sex Championship’ Ruse Sparks Operation OpSweden

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Martin Sloan, Five Years Of GDPR

    Five Years of GDPR: There is a Long Way to Run on Cross-Border Data Transfers

    Nokoyawa Ransomware Group

    All You Need to Know About The Nokoyawa Ransomware Group

    StopRansomware Guide

    Updated StopRansomware Guide Warns of Ransomware’s Shape Shifting Tactics

    Microsoft Entra

    Microsoft Build 2023: Microsoft Entra Introduced With New Identity and Access Features

    Data Protection Commission

    Irish Data Protection Commission imposes $1.3bn Fine on Meta

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    US Police Auction Seized Cell Phones Without Wiping Data, Sparks Privacy Concerns

    disclosing cybersecurity incidents

    Why Victims Fail to Disclose Cybersecurity Incidents, And Why They Should

    Stakeholder Communication During Crisis

    Stakeholder Communication During Crisis: How to Get It Right

    Government Regulation of AI businesses

    Government Regulation of AI businesses: UK Competition Watchdog Launches Review

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Billtrust Appoints Ankur Ahuja

    Billtrust Appoints Ankur Ahuja as SVP and Chief Information Security Officer

    Cybertech Africa

    Cybertech Africa: The Pan-African Event for Innovation and Networking

    IBM Acquired Polar Security

    IBM Acquires Polar Security Reportedly For $60 Million

    World CyberCon Middle East 2023

    World CyberCon Middle East 2023: The Premier Cybersecurity Conference in the Region

    ODIN by Cyble

    Cyble Launches ODIN: A Revolutionary Tool for Unparalleled Internet Exploration

    cybersecurity investments

    Cybersecurity Investments Up in April, Market Watchers Predict Growth of Over $700 billion

    OilRig APT

    Experts Warn of Increased IT Supply Chain Attacks by OilRig APT in Middle East

    World Password Day 2023

    World Password Day 2023: Protect Your Password, Create an Unbreakable One

    national cybersecurity strategy

    US National Cybersecurity Strategy: Businesses, Let’s Start with Disclosure!

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • ProductsTools
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Automotive Cybersecurity: A New Frontier

Avantika Chopra by Avantika Chopra
August 3, 2022 - Updated on February 27, 2023
in Features
1
Automotive cybersecurity
596
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter

With the launch of autonomous vehicles comes the comfort of accessing and driving a car with just a click. However, as the automotive industry continues to upgrade digitally, so does the risk of cybersecurity threats and attacks around it. At this stage, automotive cybersecurity plays a crucial role in protecting vehicles on the road, providing end-to-end security solutions, and preventing them from unauthorized access, malicious attacks and manipulation by hackers.

Currently, there are over 5.6 million electric cars worldwide, with a prediction of over 125 million electric vehicles by 2030. However, any automated vehicle can be hacked if not secured with advanced and updated automotive cyber security systems, leaving the user vulnerable to attacks.

You might also like

Google Secure AI Framework and the Greater Issue of AI Safety and Regulations

A Tale of Two US Audits: Why Does Government Cybersecurity Preparedness Fail Miserably?

DPRK’s Social Engineering Campaign Targets Think Tanks, Academia, and Media

Increasing Cyberattacks

According to a recent report by Israel21C, cyberattacks on cars increased 225% from 2018 to 2021, with over 85% of the attacks carried out remotely.

On analyzing the data of 900 publicly reported cyberattacks on vehicles in the last decade, cybersecurity and data management platform Upstream noted a rise in attacks by black hat actors from 49.3% in 2020 to 54.1% in 2021 with data/privacy breaches (38%), car theft/break-ins (27%), and control systems (20%) being the top attack categories.

The platform also projected a loss of $505 billion by 2024 in the automotive industry due to cyberattacks, clearly indicating the need to curb the rising attacks on the automotive industry.

When It All Began

Cyberattacks on the automotive industry are not a new thing. The first reported automotive cyberattacks on vehicles can be dated back to the late 1990s post the introduction of the OnBoard Diagnostics port (ODB) that gave direct access to the engine management systems.

Hacking vehicles in those days needed elaborate hardware and direct physical contact limiting the hacker’s access to a specific car and not exposing other sub-electrical systems.

However, with advancements in technology and vehicles becoming more refined, hackers have upgraded the methods of attack. The most significant disadvantage in the current technological environment is that the hacker does not have to be physically present or near the vehicle or system to gain access.

What Are the Types of Cyber Attacks  

With the increase in attacks, automotive manufacturers and business owners need to understand the various frameworks malicious actors use and the types of cyberattacks that can gravely impact and compromise the automotive industry.

Brute force attack

According to a report by CPO Magazine, the FBI warned of “Brute force” attacks terming them as the most common cyberattacks against the US automotive industry. In these attacks, cybercriminals attempt to hack into a computer’s network to infiltrate an extensive database of usernames and passwords. Using the same information, they then try to hack into the network of an automobile.

Phishing attacks via emails

Phishing attacks are carried out through emails with the intent to trick a person into revealing sensitive information. In the context of the automotive industry, emails with malicious attachments or links are sent to employees of large automotive companies, which, if clicked, compromise the network giving access to the hacker. These attacks also let cybercriminals scan sensitive company information without detection, leaving the security networks vulnerable to more attacks.

Ransomware

Once rare, ransomware attacks have become more common after cybercriminals have learned new ways to exploit system vulnerabilities. These attacks gravely compromise user data, as cybercriminals invade networks and deny access until a ransom is paid.

How can cars be hacked?

With the evolution of connected, autonomous, and self-driving cars, vehicles are now more dependent on the internet. They now contain various computerized equipment such as electronic control unit (ECU), a controller area network (CAN), Bluetooth connections, key fob entry, and more.

While this enhances user experience, it also gives hackers various loopholes to exploit and compromise auto industry computer systems.

Remote Keyless Hacking

Hackers can compromise the keyless entry system. Malicious actors use  superior signal boosters to amplify the key fob’s signal and gain vehicle access even if the owner is not next to it.

In a recent report by Tech Crunch, security researchers unveiled a vulnerability in Honda’s keyless entry system that gave access to hackers, letting them unlock and start all Honda vehicles currently on the market.

Breaching centralized system

The Controller Area Network (CAN bus), the system made for vehicle communication, is the heart of a modern car and, if hacked, can compromise the complete central server. From user information, sales data to details regarding every vehicle attached, if malicious actors can bypass the CAN bus, disrupt the system with the user losing complete control of the car.

CAN bus hacking is considered a grave threat. According to a report by Wired, 1.4 million units of Chrysler Jeep were recalled after a group of hackers demonstrated how they could gain access to the car’s central system while it was being driven.

Mobile App Hacks

Hackers can easily gain access to vehicles by hacking into the mobile phones connected to them. The increased upgradation and dependency on smart mobile phones make vehicles more vulnerable than ever. Hackers can access vital information such as credit card details, passwords and financial data once they have breached the security system.

However, it is not only the loss of sensitive data but also access to connected devices that make the situation worse. According to a report by Vice, a hacker found that he could remotely kill car engines after breaking into GPS Tracking Apps.

Growing Automotive Cyber security

The success of cyberattacks on vehicles and the automotive industry compelled manufacturers and business owners to take automotive cyber security seriously. The interest gave an instant boost, assisting the existing cybersecurity market in growing multi-fold. The automotive cyber security global market size is expected to grow to $4.16 billion in 2026 at a CAGR of 19.5%, as reported by The Business Research Company. The growth is directly linked to the significant increase in the number of cyberattacks in the automotive industry.

Why is automotive cyber security important?

Modern vehicles exhibit various automotive IoT devices that, if breached, can critically compromise the car and put the user at risk. Automotive cyber security plays a crucial role and helps in detecting and preventing cyberattacks, keeping the vehicle and user data secure.

The National Highway Traffic Safety Administration (NHTSA) defined automotive cybersecurity as “the protection of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data from malicious attacks, damage, unauthorized access, or manipulation.”

Who are the key market players?

Argus Cyber Security, Arilou Technologies, Continental AG, ESCRYPT GmbH, GuardKnox, Harman International, Trillium, Saferide Technologies Ltd, Lear Corporation., Karamba Security, Intel Corporation, Infineon Technologies AG, Cisco Systems, Delphi Automotive PLC, Vector Informatik GmbH, and Symantec Corporation are among the major players in the global automotive cybersecurity news market.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: automotive cybersecuritycan cars be hackedcar hackingcyber expresscyber express newscyberattack automotive industrycybercrimescybersecurity threatselectric vehicles
Previous Post

Concerns raised over NDAA provision due to information sharing with CISA

Next Post

Community Colleges can Combat Cybersecurity Workforce Gap

Avantika Chopra

Avantika Chopra

Senior Sub-Editor, The Cyber Express

Related Posts

Google Secure AI Framework
Features

Google Secure AI Framework and the Greater Issue of AI Safety and Regulations

by Chandu Gopalakrishnan
June 9, 2023
Government Cybersecurity Preparedness
Features

A Tale of Two US Audits: Why Does Government Cybersecurity Preparedness Fail Miserably?

by Chandu Gopalakrishnan
June 8, 2023
DPRK’s Social Engineering Campaign Targets Think Tanks, Academia, and Media
Espionage

DPRK’s Social Engineering Campaign Targets Think Tanks, Academia, and Media

by Editorial
June 3, 2023
online scams
Features

How Do ‘Nigerian Prince’ and Other Online Scams Hoodwink Us?

by Vishwa Pandagle
June 1, 2023
Mikko Hypponen
Features

I Was Wrong About the Future…: Mikko Hypponen

by Rajashakher Intha (Raj)
May 28, 2023 - Updated on May 29, 2023
Next Post
Cybersecurity Workforce

Community Colleges can Combat Cybersecurity Workforce Gap

Comments 1

  1. Pingback: Chinese Companies Press for Better Automotive Cybersecurity

Latest Issue is Out. Subscribe Now

Cyber express

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

mailchimp

Latest Cyber News

Google Secure AI Framework
Features

Google Secure AI Framework and the Greater Issue of AI Safety and Regulations

June 9, 2023
LockBit Threatens to Publish Data Stolen From Cortina Watch Cyber Attack
Firewall Daily

LockBit Threatens to Publish Data Stolen From Cortina Watch Cyber Attack

June 9, 2023
OneDrive outage
Firewall Daily

Microsoft Hacked? OneDrive Services Disrupted, Anonymous Sudan Claims Responsibility

June 9, 2023
Critical Vulnerabilities in VMware Aria Operations for Networks Spotted; Patch Issued
Firewall Daily

Critical Vulnerabilities in VMware Aria Operations for Networks Spotted; Patch Issued

June 8, 2023

Categories

Web Stories

Top 10 CISOs to Follow in 2023
Top 10 CISOs to Follow in 2023
Top 10 Ransomware Gangs in 2023
Top 10 Ransomware Gangs in 2023
Top 5 IoT Security Risks in 2023
Top 5 IoT Security Risks in 2023
Top 10 CTF Platforms in 2023
Top 10 CTF Platforms in 2023
Types of Risks Covered by Cyber Insurance
Types of Risks Covered by Cyber Insurance

About

The Cyber Express by Cyble

#1 Trending Cyber Security News and Magazine

The Cyber Express  by Cyble is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Events & Conferences related information: [email protected]

 

Quick Links

  • About Us
  • Advertise With Us
  • Contact Us
  • Editorial Calendar

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News
  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar
    • Endorsed Events
  • Products
    • Cyble Vision
    • Cyble Hawk (LEA, Govt.)
    • Am I Breached
    • Cyble Odin (Beta)

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Top 10 CISOs to Follow in 2023 Top 10 Ransomware Gangs in 2023 Top 5 IoT Security Risks in 2023 Top 10 CTF Platforms in 2023 Types of Risks Covered by Cyber Insurance