Thank you for Subscribing to Apac CIO Outlook Weekly Brief
Editor's Pick (1 - 4 of 8)
3 Reasons Automakers are Prioritizing Tech Safety (And How They're Doing it)
By Arun Ganesan, VP & CTO, Esurance
In an attempt to get ahead of automotive cybercriminals, the auto industry also formed the Automotive Information Sharing and Analysis Center (Auto-ISAC) to cooperatively track cyber threats and identify potential exploits in-vehicle electronics. Data Sharing According to a recent Esurance report, most cars built after 2014 are collecting data—a lot of data—and sending it back to the manufacturer. This can include your driving habits, the roads you drive on and even the music you listen to behind the wheel. Some expect that as much as 25 GB of data about you and your vehicle could be transmitted every single hour. While there are many safety benefits to carmakers collecting this data, it still opens a door for people who want to steal it. Fortunately, manufacturers understand the business risks associated with high-profile data breaches and they take serious measures to protect the data they collect. Additionally, the European Union’s new General Data Protection Regulation Act includes new consumer protections requiring that drivers be informed of the types of data being collected about them, as well as the right to authorize who has access to it. Though this new regulation only protects consumers within the European Union, it serves as a model for regulators around the world. With vigilant action from both automakers and governments, consumers in the coming years should have more control over what information they share, and hackers should have less access to it. Remote Unlocking Connected cars aren’t the only ones vulnerable to high-tech exploits. In fact, any vehicle with a remote locking and/or starting system could be easily victimized by a “relay attack.” These schemes use radio-enabled key fobs that trawl for the specific signal emitted by the car owner’s key, then replicate it to unlock the vehicle’s door and even start the engine. It’s not the newest tactic in the book, but it nonetheless poses a threat to your vehicle and your information security. The automobile industry assures consumers that it’s working on fixes for relay attacks but, until there’s a solution, you can protect yourself by storing your car keys in a radio-proof pouch or container. Connected-car technology is still in its relative infancy. That means drivers, car buyers and automakers alike need to be aware of the risks that this modern tech presents and be proactive in protecting themselves.