Hackers violate the safety of the automotive sector

Interconnectivity is part of daily life thanks to the Internet of Things. The various devices and applications connected to modern cars are the new target of network pirates

At present, technology plays a fundamental role in the lives of humans. Every day new applications and devices are known that arrive to solve problems of communication, connectivity and mobility. However, the fact of being connected to online platforms increases the vulnerability of these innovations to hackers.

Cybersecurity is an issue of global concern. In this sense, the government of Japan through the National Institute of Information Technology and Communication has decided to hack this month a total of 200 million devices to know the most vulnerable routes to the proximity of the Olympic Games.

Futuristic cars are now on the focus of espionage attacks, remote manipulation, interruption of services and, of course, thefts. We must remember that futuristic vehicles now include different devices, applications and mechanisms for communication and control of functions that can be attacked remotely.

Shared mobility is targeted by hackers because they are based on the autonomy provided by technology. Cybersecurity expert Andreas Herzig, of Global Lead Automotive, said that “compared to the old models, the new cars have 40% programming. A current vehicle has 100 million lines of code: seven times more than an airplane “

Herzig points out different forms of attack: “espionage, data theft, spam, involuntary manipulation of the vehicle and interruption of services”. As a way to control these crimes, sectors involved seek to establish effective regulation for manufacturing focused on protection systems, permanent updates of the vehicle, tracking and control mechanisms to safeguard the so-called “digital identity” of the car.

The ambition is to incorporate the fifth generation of mobile telephony – 5G –, but reinforced. Currently, European specialists work on the weaknesses of this technology to minimize vulnerability.

M.Pino

Source: El País

Receive this and all our information directly on your cell phone through our channel on Telegram:https://t.me/BitFinanceNews

You might also like