APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Simulation
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    The Cloud, IoT, and Machine Learning-Leading to the Path of Opportunities

    Michael Spandau, CIO & SVP, Fender Musical Instruments Corporation

    Do What You Want To Do, Not What You Have To Do

    Curt Pederson, CIO, University of Portland

    Analytics and Simulation-Powerful Tools in Business

    Robert Roser, CIO, Fermilab

    Technology should be Seamless across all Form Factors

    Jeff Willis, CIO, Allrecipes

    A creative approach to remote simulator installations

    Sharon Cooke, CEO, Airways International Ltd

    Using Simulation to Improve Patient Safety and Quality of Care How the Nemours Institute for Clinical Excellence is Taking Simulation Further

    Maria Carmen G. Diaz, Medical Director of Simulation, Nemours Institute for Clinical Excellence, North.

    First Principle Models to bolster the Digital Twin Panorama

    Richard Porter, Principal Engineer, Simulation, Yokogawa Australia Pty Ltd

    The Game Changing Face of Simulation

    Yu Fang Yong, Expert in Mechanical Architecture Structural Simulation Test and Analysis, Continental and Wong Chee Ling, Group Leader of Electrical and Mechanical Simulation and Verification, Continental

    right

    3 Reasons Automakers are Prioritizing Tech Safety (And How They're Doing it)

    Arun Ganesan, VP & CTO, Esurance

    Tweet
    content-image

    Arun Ganesan, VP & CTO, Esurance

    For the last century or so, carmakers have been looking for innovative ways to make their vehicles safer. Simply buckling your seatbelt, for instance, reduces the risk of death by 45 percent and the risk of serious injury by 50 percent.

    But in the era of connected cars, drivers are facing a whole new world of safety threats that can’t be thwarted by a seatbelt or an airbag. Every device you connect to the internet gives cybercriminals a new window to steal your data—and connected cars are no different.

    Here are three of the high-tech threats facing connected-car owners, along with the ways automakers are trying to get ahead of those threats.

    Car Hacking

    Car hacking is one of the scariest modern-day threats to drivers. In 2015, Wired proved this to the masses in an article demonstrating that hackers with the right know-how can disable a car’s engine from just about anywhere in the world. No direct contact with the vehicle is even necessary. What’s worse, they can pull off this frightening exploit while the car is barreling down the highway at 70 miles per hour.

    The key to car hacking is the simple cellular connection that allows your car to give you GPS directions, call for roadside assistance or manage your in-car entertainment. Digital invaders can use this technology to commandeer crucial functions like braking, acceleration, and steering.

    The discovery by Wired grabbed the attention of automakers in a major way, leading to the recall of 1.4 million vulnerable vehicles from multiple manufacturers.

    In an attempt to get ahead of automotive cybercriminals, the auto industry also formed the Automotive Information Sharing and Analysis Center (Auto-ISAC) to cooperatively track cyber threats and identify potential exploits in-vehicle electronics.

    Data Sharing

    According to a recent Esurance report, most cars built after 2014 are collecting data—a lot of data—and sending it back to the manufacturer. This can include your driving habits, the roads you drive on and even the music you listen to behind the wheel. Some expect that as much as 25 GB of data about you and your vehicle could be transmitted every single hour.

    While there are many safety benefits to carmakers collecting this data, it still opens a door for people who want to steal it. Fortunately, manufacturers understand the business risks associated with high-profile data breaches and they take serious measures to protect the data they collect.

    Additionally, the European Union’s new General Data Protection Regulation Act includes new consumer protections requiring that drivers be informed of the types of data being collected about them, as well as the right to authorize who has access to it.

    Though this new regulation only protects consumers within the European Union, it serves as a model for regulators around the world. With vigilant action from both automakers and governments, consumers in the coming years should have more control over what information they share, and hackers should have less access to it.

    Remote Unlocking

    Connected cars aren’t the only ones vulnerable to high-tech exploits. In fact, any vehicle with a remote locking and/or starting system could be easily victimized by a “relay attack.” These schemes use radio-enabled key fobs that trawl for the specific signal emitted by the car owner’s key, then replicate it to unlock the vehicle’s door and even start the engine. It’s not the newest tactic in the book, but it nonetheless poses a threat to your vehicle and your information security.

    The automobile industry assures consumers that it’s working on fixes for relay attacks but, until there’s a solution, you can protect yourself by storing your car keys in a radio-proof pouch or container.

    Connected-car technology is still in its relative infancy. That means drivers, car buyers and automakers alike need to be aware of the risks that this modern tech presents and be proactive in protecting themselves.
    tag

    Information Security

    GPS

    Entertainment

    Cyber Threats

    Weekly Brief

    loading
    Top 10 Simulation Consulting/ Services Companies - 2020
    ON THE DECK

    Simulation 2020

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Building Smarter Content Systems for Scalable Growth

    Building Smarter Content Systems for Scalable Growth

    Judy Tay, Head of Content, First Page Digital
    The Thoughtful Innovation behind Every Loaf

    The Thoughtful Innovation behind Every Loaf

    Keng Ng, Chief Technology Officer, Bakers Delight
    Lessons for Ambitious Professionals in a Digital World

    Lessons for Ambitious Professionals in a Digital World

    Andreas Kurz, Global Head of Digital Transformation, Alfagomma Group
    Designing For Regeneration, Not Just Resilience

    Designing For Regeneration, Not Just Resilience

    Gregory Kovacs, Design Director, Benoy
    Listening Beyond Hearing

    Listening Beyond Hearing

    Salvatore Incardona, Head of IT, Amplifon Australia
    Modernizing Lending Through Innovative, Secure and Scalable Technology

    Modernizing Lending Through Innovative, Secure and Scalable Technology

    Steven Meek, Chief Information Officer, Pepper Money
    Advancing the Chemical Industry through Digital Transformation

    Advancing the Chemical Industry through Digital Transformation

    Jan Mandrup Olesen, Global Head of Digital Business, Indorama Ventures
    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://simulation.apacciooutlook.com/cxoinsights/3-reasons-automakers-are-prioritizing-tech-safety-and-how-they-re-doing-it-nwid-6873.html