The rise of connected cars, equipped with internet connectivity, advanced sensors, and integrated technologies, has revolutionized the automotive industry, offering enhanced convenience, safety, and entertainment. However, this digital transformation has also introduced a new and growing threat: cyberattacks. As connected vehicles become more dependent on wireless communication, they also become prime targets for hackers seeking to exploit vulnerabilities for malicious purposes. From unauthorized access to vehicle control systems to data theft, the risks associated with cyberattacks on connected cars are significant. To safeguard against these threats, manufacturers, software developers, and car owners must adopt a multi-layered approach to cybersecurity.

1. Secure Vehicle Networks

One of the first lines of defense against cyberattacks is securing the internal networks of the vehicle. Modern vehicles feature a complex web of communication systems between various components, such as the infotainment system, navigation system, and engine control unit (ECU). Attackers could exploit vulnerabilities in these networks to gain control over critical functions.

To prevent this, automakers must implement strong encryption protocols to protect data exchanges between the vehicle’s systems. Additionally, employing firewalls and intrusion detection systems within the car’s network can help identify and block suspicious activities before they escalate into a full-scale attack.

2. Regular Software Updates

Just like smartphones and computers, connected cars rely on software that requires periodic updates to patch vulnerabilities. Cybercriminals often target outdated software with known flaws, so keeping the vehicle’s software up to date is essential for security.

Car manufacturers should establish secure, over-the-air (OTA) update mechanisms that allow seamless updates without requiring the vehicle owner to visit a dealership. These updates should be verified using strong authentication methods to prevent malicious actors from pushing fraudulent software.

3. Enhanced Authentication Systems

One of the most vulnerable entry points for cybercriminals is through unauthorized access to the car’s systems via mobile apps or keyless entry features. By exploiting weak authentication, hackers can take control of the vehicle or steal personal data.

Car manufacturers can thwart such attacks by implementing multi-factor authentication (MFA) for remote access, ensuring that only authorized users can connect to the vehicle. Additionally, pairing the car’s security system with biometric authentication, such as fingerprint or facial recognition, can provide an extra layer of protection against unauthorized access.

4. Data Privacy and Protection

Connected cars collect a vast amount of data, including location, driving habits, and personal preferences. If this data falls into the wrong hands, it could be used for identity theft or surveillance. Data breaches could also expose sensitive information about the car’s user, such as their personal contacts or payment details.

To prevent such breaches, automakers must implement robust encryption measures to protect data both at rest (stored) and in transit (being transmitted). Furthermore, anonymizing data wherever possible can ensure that even in the event of a breach, the information cannot be directly linked back to the car owner.

5. Vulnerability Testing and Penetration Testing

Car manufacturers should regularly perform vulnerability assessments and penetration testing to identify and address potential security flaws in their vehicles. These tests, conducted by cybersecurity experts, simulate real-world hacking attempts to evaluate the car’s ability to withstand cyberattacks.

By proactively identifying and fixing vulnerabilities, automakers can improve the overall resilience of their connected vehicles. Additionally, collaboration with independent cybersecurity firms can help ensure that testing methodologies remain up to date and comprehensive.

6. Collaborating with Cybersecurity Experts

Cybersecurity is a rapidly evolving field, and staying ahead of the latest threats requires constant vigilance. Automakers should partner with cybersecurity experts and organizations to share intelligence about emerging threats and best practices.

Collaborating with experts who specialize in automotive cybersecurity can help manufacturers stay informed about the latest attack vectors and develop more effective defenses. Additionally, such collaborations may lead to industry-wide standards and protocols, ensuring that security remains a priority across the automotive sector.

7. Educating Consumers

While manufacturers have a significant role to play in securing connected cars, consumers also need to be proactive in protecting their vehicles from cyber threats. Car owners should be educated on the importance of secure password management, the risks of connecting to public Wi-Fi networks, and the need for regular software updates.

Automakers can help raise awareness by providing clear instructions for secure usage and by offering easy-to-follow guides on how to enable security features such as two-factor authentication and encrypted communication.

Conclusion

The future of connected cars is exciting, but with innovation comes the responsibility to safeguard against the growing threat of cyberattacks. By securing vehicle networks, providing regular software updates, employing strong authentication systems, protecting data privacy, and collaborating with cybersecurity experts, the automotive industry can reduce the risks posed by cyber threats. Additionally, educating consumers on best practices for cybersecurity is crucial in ensuring that connected vehicles remain safe from attack. In a world where cyber threats are becoming more sophisticated, a proactive and multi-layered approach to security will be essential for keeping connected cars safe on the road.

The post How to thwart cyber attacks on connected cars appeared first on Cybersecurity Insiders.

Electric Vehicles (EVs) are often praised for their environmental benefits and cost-effectiveness, but there are concerns about their security. According to experts from Check Point Software, EV charging stations are highly vulnerable to cyberattacks. These attacks could lead to the theft of personal data from vehicles or, even worse, allow hackers to take control of the car and cause major disruptions.

Traditional internal combustion engine cars typically contain around 100-200 million lines of code, but EVs are even more complex. With more electronic control units (ECUs) added to manage Eco-friendly features, these vehicles rely heavily on internet connectivity to sync with cloud-based management platforms. This opens up new potential vulnerabilities.

Charging stations themselves are also susceptible to cyberattacks, as they are linked to critical energy infrastructure. Hackers could exploit these weaknesses to disrupt power supplies, causing temporary or even permanent blackouts.

According to Peugeot, over a million new EVs are expected to hit the roads in the U.S. and U.K., amplifying the security risks. If the global numbers are taken into account, the threat could grow exponentially, regardless of what oil-rich nations anticipate for the future of fuel.

These risks arise because charging stations often lack proper cybersecurity measures. Many have insecure internet connections, insufficient network segmentation, and fail to meet authentication and encryption standards, all while managing large amounts of energy.

Security researchers point out that these vulnerabilities could lead to high-profile attacks. For example, during the early days of the Ukraine war in 2022, a cyberattack on Moscow and St. Petersburg highways resulted in anti-Putin messages being displayed. Similarly, in the U.K., hackers took over charging station displays on the Isle of Wight, showing explicit content for an extended period.

A significant data breach also occurred in early 2024, when servers at Shell, which stored EV charging logs, were compromised. Sensitive user data was reportedly stolen and sold on the dark web.

Given these risks, it’s crucial that companies building charging stations take a thoughtful approach, incorporating strong security measures to prevent both current and future cyber threats. Drivers should also exercise caution when using cheaper charging stations, ensuring their vehicles are regularly updated with the latest software and restricting data connections to manual settings when possible.

The post EV Charging Stations vulnerable to cyber attacks appeared first on Cybersecurity Insiders.

Electric Vehicles (EVs) are often praised for their environmental benefits and cost-effectiveness, but there are concerns about their security. According to experts from Check Point Software, EV charging stations are highly vulnerable to cyberattacks. These attacks could lead to the theft of personal data from vehicles or, even worse, allow hackers to take control of the car and cause major disruptions.

Traditional internal combustion engine cars typically contain around 100-200 million lines of code, but EVs are even more complex. With more electronic control units (ECUs) added to manage Eco-friendly features, these vehicles rely heavily on internet connectivity to sync with cloud-based management platforms. This opens up new potential vulnerabilities.

Charging stations themselves are also susceptible to cyberattacks, as they are linked to critical energy infrastructure. Hackers could exploit these weaknesses to disrupt power supplies, causing temporary or even permanent blackouts.

According to Peugeot, over a million new EVs are expected to hit the roads in the U.S. and U.K., amplifying the security risks. If the global numbers are taken into account, the threat could grow exponentially, regardless of what oil-rich nations anticipate for the future of fuel.

These risks arise because charging stations often lack proper cybersecurity measures. Many have insecure internet connections, insufficient network segmentation, and fail to meet authentication and encryption standards, all while managing large amounts of energy.

Security researchers point out that these vulnerabilities could lead to high-profile attacks. For example, during the early days of the Ukraine war in 2022, a cyberattack on Moscow and St. Petersburg highways resulted in anti-Putin messages being displayed. Similarly, in the U.K., hackers took over charging station displays on the Isle of Wight, showing explicit content for an extended period.

A significant data breach also occurred in early 2024, when servers at Shell, which stored EV charging logs, were compromised. Sensitive user data was reportedly stolen and sold on the dark web.

Given these risks, it’s crucial that companies building charging stations take a thoughtful approach, incorporating strong security measures to prevent both current and future cyber threats. Drivers should also exercise caution when using cheaper charging stations, ensuring their vehicles are regularly updated with the latest software and restricting data connections to manual settings when possible.

The post EV Charging Stations vulnerable to cyber attacks appeared first on Cybersecurity Insiders.

In today’s interconnected world, the advent of smart cars has brought convenience and innovation to the automotive industry. However, with this connectivity comes a new set of cybersecurity challenges, particularly concerning user privacy. Modern cars, equipped with sophisticated onboard systems and internet connectivity, are susceptible to cyber threats that can compromise the personal data and safety of their users.

1. Data Collection and Privacy Concerns : Smart cars gather an extensive amount of data, ranging from GPS locations and driving patterns to personal preferences and vehicle diagnostics. While this data is intended to enhance user experience and improve vehicle performance, it also raises significant privacy concerns. Unauthorized access to this data can potentially reveal sensitive information about users’ daily routines, travel habits, and even their physical locations, leading to privacy breaches and potential misuse.

2. Hacking and Remote Control Risks: The connectivity of smart cars makes them vulnerable to hacking attempts. Malicious actors can exploit vulnerabilities in car software or wireless networks to gain unauthorized access to vehicle systems. This could enable them to remotely control critical functions such as brakes, steering, and acceleration, posing severe safety risks to passengers and other road users.

3. Tracking and Surveillance Issues: The continuous collection of data by smart cars opens the door to potential tracking and surveillance concerns. Without adequate security measures, third parties could track a vehicle’s movements or monitor its occupants without their knowledge or consent. This invasion of privacy undermines user trust and raises ethical questions about data ownership and usage.

4. Manufacturer and Third-Party Data Handling : Automakers and third-party service providers often store and process user data to deliver personalized services and improve product performance. However, the handling of this data may not always align with stringent privacy standards. Data breaches or unauthorized data sharing could expose users to identity theft, fraud, or other malicious activities, highlighting the importance of robust data protection measures throughout the automotive ecosystem.

Addressing Cybersecurity in Smart Cars

To mitigate these risks and safeguard user privacy, stakeholders in the automotive industry must prioritize cybersecurity measures:

Encryption and Secure Communication: Implement strong encryption protocols to protect data transmission between the car, external systems, and cloud services.

Regular Software Updates: Ensure timely updates and patches to address vulnerabilities and improve system security.

User Consent and Transparency: Provide clear information to users about data collection practices, purposes, and rights, obtaining explicit consent for data processing.

Cybersecurity Testing and Audits: Conduct regular security assessments and audits of vehicle systems and connected infrastructure to identify and address potential weaknesses proactively.

Regulatory Compliance: Adhere to regulatory frameworks such as GDPR (General Data Protection Regulation) and industry standards to uphold data protection principles and accountability.

Conclusion

While smart cars offer numerous benefits in terms of connectivity and functionality, they also introduce complex cybersecurity challenges, particularly concerning user privacy. As technology continues to evolve, collaboration between automakers, cybersecurity experts, regulators, and consumers is essential to develop robust security measures that protect personal data and ensure safe driving experiences. By addressing these challenges proactively, the automotive industry can foster trust and confidence among users while embracing the potential of smart and connected vehicles.

The post How cars can pose a cyber threat to user privacy appeared first on Cybersecurity Insiders.

The automotive industry is under pressure to comply with a variety of cybersecurity regulations and standards, including UN Regulation No. 155, ISO/SAE 21434, and Chinese GB Standards. The year 2024 marks a crucial period for these regulations, especially UN Regulation No. 155, which will be fully implemented.

C2A Security’s EVSec Risk Management and Automation Platform is increasingly adopted within the automotive sector to address the challenge of complying with cybersecurity regulations and standards efficiently. As of 2023, C2A Security has entered into commercial agreements with over 10 customers and partners, including a significant enterprise agreement with a European Commercial Vehicle Manufacturer.

C2A Security’s EVSec platform is designed to enhance product security in automotive software development and operations by automating traditional manual processes. It facilitates collaboration among teams, customers, and the supply chain and offers comprehensive digital twin capabilities. The platform’s continuous feedback mechanism for product operations and vulnerabilities significantly contributes to the agility of software development processes.

In 2023, C2A Security expanded its customer base to include multiple OEMs and Tier 1 suppliers through successful evaluations and partnerships with industry leaders such as Daimler Truck AG, BMW Group, Marelli, NTT Data, Siemens, and Valeo.

EVSec aids in aligning with regulatory standards and best practices by mapping and automating compliance efforts, crucial for companies pioneering new vehicle technologies and infrastructure. Roy Fridman, CEO of C2A Security, highlights the importance of automated product security platforms like EVSec in addressing the challenges posed by current and emerging regulatory demands. He references a case from late 2023 where a premium car manufacturer halted sales of a popular model in the European Union due to non-compliance, underscoring the competitive necessity for advanced security automation in product development and operations.

C2A Security positions itself as a leading provider of risk-driven DevSecOps platforms tailored for the automotive industry, offering solutions that transform cybersecurity from a limitation to a value multiplier. Founded in 2016 by NDS/Cisco veteran Michael Dick and headquartered in Jerusalem, Israel, C2A Security serves a global market, including Daimler Truck AG, BMW Group, Siemens, Valeo, and others, driving down software release times and costs while enhancing cybersecurity posture. For more information, visit C2A Security’s website www.c2a-sec.com.

The post C2A Security’s EVSec Platform: Driving Cybersecurity Compliance in the Automotive Industry appeared first on Cybersecurity Insiders.

India has emerged as a trailblazer in proactively addressing the looming threat of cyber attacks on domestically manufactured vehicles. This initiative aligns with guidelines established by the United Nations Economic Commission for Europe World Forum for Harmonization of Vehicle Regulation, setting a precedent for global cybersecurity measures in the automotive industry.

The newly proposed regulations adhere to WP.29 standards, designed to fortify vehicle management systems against potential digital vulnerabilities. While the global push towards adopting autonomous vehicles gains momentum, original equipment manufacturers (OEMs) are diligently equipping these vehicles with advanced features. Unfortunately, there has been a noticeable lack of emphasis on securing these vehicles from cyber threats.

In response to this gap, it is imperative for both vehicle manufacturers and suppliers of original equipment to implement a robust multi-layered security framework. This approach aims to thwart hackers from compromising data and manipulating the management systems and connectivity features inherent in modern vehicles.

While much of the world, excluding Europe, is contemplating policies to safeguard automotive cars from cyber threats, India has taken a proactive stance. The country has devised a comprehensive plan simplifying the process for OEMs to safeguard their vehicles from digital assaults. Notably, this includes extending protection to electric vehicle (EV) charging stations, known as Electric Vehicle Supply Equipment (EVSEs). These stations not only supply power to EVs but also facilitate two-way communication, crucial for activities such as software updates.

The Honorable Minister of Road Transport and Highways in India, Shri Nitin Gadkari, has endorsed the March 2023 draft, making it mandatory for vehicle manufacturers to implement a defensive framework to navigate the cybersecurity challenges. The next stage involves expert scrutiny of the draft, culminating in the formulation of a bill for parliamentary approval in the upcoming session.

An intriguing aspect of this plan is its proactive approach to connected cars in the M and N categories, encompassing both passenger and commercial vehicles. Despite the fact that connected cars, predominantly observed in the highly priced electric vehicle sector, constitute less than 3% of total annual sales, this initiative underscores the significance of preemptive cybersecurity measures in an increasingly interconnected automotive landscape.

The post India to make CyberShield mandatory for Vehicles appeared first on Cybersecurity Insiders.

Tesla vehicle owners in China are facing a concerning situation as the looming ban on foreign electric vehicles from the company comes into effect. The issue ignited when an airport in a prominent southern city enacted a ban on parking Tesla electric cars on its premises due to concerns over data security.

The response from Beijing indicated that this ban could potentially extend to other transit stations due to mounting worries about data confidentiality. However, authorities clarified that the restriction would be limited to public roads, and vehicle movement and parking on private properties would remain unaffected until further directives are issued.

The backdrop for this development lies in Beijing’s recent introduction of an anti-espionage law that obliges foreign corporations operating within China to contain information storage and processing within the country’s borders. Essentially, any data generated within China must be stored and processed locally and should not be transmitted to foreign servers.

This legal shift has posed challenges for multinational companies, with Apple encountering its own set of difficulties. Industry experts predict that the American electric automaker, Tesla, could also face hurdles due to this law. While the warnings issued by dealerships to potential buyers about a potential ban might not have practical grounds, it has stirred uncertainty within the market.

China has emphasized the necessity for companies to adhere to its data compliance regulations, and Tesla finds itself among the entities unwilling to take substantial risks. This is particularly significant considering that Tesla, under the leadership of Elon Musk, has captured a substantial 19% share of the annual electric car sales in China.

Addressing the situation, the former CEO of Tesla, Elon Musk, clarified that the “Sentry” feature in their vehicles has been modified to align with the prevailing information compliance laws in China. He also expressed the company’s willingness to take further measures if circumstances dictate.

For reference, Tesla’s “Sentry” mode is a security feature that surveils the vehicle’s surroundings when parked, utilizing its cameras to monitor any unauthorized activities and promptly alert the driver in case of potential issues.

The post Tesla internet connected cars to be banned in China for Data Security concerns appeared first on Cybersecurity Insiders.

If you browse online news sources covering San Francisco, it’s evident that there is a recurring theme of articles highlighting accidents involving driverless vehicles. These incidents range from head-on collisions with buses to disregarding warning signs and driving into power lines, regardless of their magnitude. Considering the performance of Google’s autonomous vehicles, this situation is certainly worrisome.

Most of these incidents occur in and around San Francisco, causing the public to live in constant fear of being involved in an accident with an AI-driven vehicle at any given time. Despite being hailed as the future of transportation in the city, there is still much to be understood and evaluated before such a declaration can be made.

Fortunately, these incidents have not resulted in serious injuries or fatalities thus far, although they have led to property damage and significant traffic congestion.

Speaking on the condition of anonymity, representatives from the city’s fire department and first responders have also expressed concerns regarding Google’s self-driving cars. These technological marvels often become confused with red lights from emergency vehicles and come to a halt in the middle of the road, causing traffic disruptions and creating challenges for 911 responders.

Automobile manufacturers such as GM, Ford, Tesla, and Jaguar acknowledge that issues are expected during the early stages of tech development. However, they believe that these challenges will gradually diminish as the technology advances and evolves.

Until then, the residents of San Francisco may have to endure the negative consequences associated with AI-driven vehicles, as they continue to navigate through their city.

Note: Autonomous vehicles, also known as driverless cars, rely on an array of cameras, sensors, artificial intelligence software, and radar to enable independent movement and transportation between destinations, eliminating the need for human intervention behind the steering controls.

The post Google AI powered driverless vehicles making San Francisco a testing ground appeared first on Cybersecurity Insiders.

Do you own a Tesla electric vehicle? If yes, then this news piece could be of interest to you. According to research conducted by Reuters, private recordings of individual Tesla car customers are being shared by former employees via chat rooms and other resources.

The circulated clips include a child being hit by a car, a couple having an intimate experience in the cabin, a Tesla customer washing her vehicle almost unclothed, and some private conversations taking place before the car when the vehicle was halted.

Elon Musk’s Tesla has issued a press statement immediately claiming that all recordings remain anonymous and securely stored and encrypted on their servers.

Technically, all vehicles manufactured by the electric car manufacturer are equipped with cameras as they assist in driving and are called self-driving or autonomous vehicles.

Recordings streamlined from the cameras are stored on the servers where utmost privacy is maintained. However, Reuters’ recent study suggests that contrary practices were being followed by the company’s employees between 2019 and 2022, where they were able to share and circulate images and videos from any of their cars via an internal messaging system.

The news resource claims that the shared images and videos recorded by customer car cameras were sometimes highly invasive, as at least nine of the firm’s former employees admitted to such practices being followed in the company since 2016.

Tesla’s ‘Customer Privacy Notice’ states that all its vehicle camera recordings remain anonymous. But two of the battery vehicle manufacturers agree that their cars often leak location details to them, thus revealing the identity of the owner living in the vicinity.

So, under such circumstances, whom should be blamed? Is it the car, the user, or the employee/s?

The post Tesla staff sharing in-car customer images appeared first on Cybersecurity Insiders.

Did you know that half of all cyberattacks in the automotive industry happened in 2021? 

This represented a more than 140% increase from attacks in the automotive industry in 2020. This shouldn’t be surprising, considering that the number of vehicles connected to the internet has risen dramatically over the last few years. 

A ‘connected’ vehicle, in this case, is simply any vehicle that can connect with devices over a wireless network. This provides excellent flexibility and convenience for everyday drivers. 

For example, specific maintenance issues that typically require a visit to the dealership (such as an issue with the car’s speakers or even certain problems with the suspension system) can now be solved via a simple software update. But this has also opened up a massive new front for cyberattacks. 

In this article, we’ll share the top ten automotive security software companies working hard to ensure that connected vehicles are protected from rising cyber threats. 

Why Are Vehicles Now At Greater Risk of Cyberattacks?

Vehicles, in general, have been evolving drastically over the last decade. Electric vehicle manufacturers such as Tesla have revolutionized the auto industry, offering drivers greater convenience and lower costs with their enhanced connectivity and ability to run off of an electric charge rather than expensive fuel. That’s why 71% of Canadians are now considering an electric vehicle with connectivity for their next car purchase, and over a quarter of Americans are saying the same thing. 

We’re now entering an era where the cars we use for driving to and from home every day are no longer just a car. Instead, cars are directly connected devices that we must treat the same way we do our laptops, tablets, phones, and IoT devices. 

And while the automotive industry is fully aware of the importance of cybersecurity for their vehicles, there’s also no denying that the industry has been caught completely off guard by the sheer volume of cyberattacks that connected cars have sustained over the last three years. The very fact that we witnessed the most significant number of automotive cyberattacks the previous year attests to that, and it’s only going to get worse next year. 

If malicious cybercriminals can hack a connected vehicle, they can potentially gain access to financial or personal data or even gain control over the vehicle’s functions. In other words, criminals can hijack your connected car from afar.

But just as there are third-party security and software vendors dedicated to protecting your laptops or phones when you’re connected to WiFi, there are also vendors devoted to safeguarding your connected vehicles from cyberattacks as well too. 

We’ll talk about ten of these vendors in the next section. 

The Ten Startups Focused On Protecting Connected Cars From Cyber Attacks 

Here are the ten startups focused on protecting connected vehicles from cyber attacks: 

Aptive

Aptive is a cybersecurity company that offers to protect connected vehicles at the software level. The company’s main security product is the Smart Vehicle Architecture, which is designed to establish a secure connected gateway to properly manage the vehicle’s network. This controls both the wireless and wired connections of the car and only offers a single entry point into the vehicle (thus keeping the attack surface to a minimum).

Britive 

Based out of Los Angeles, Britive offers cloud-based security products that are designed to organize user permissions and detect threats via continuous scanning. The company gained awareness on the automotive security map when they helped Toyota to manage control privileges for user accounts and adequately set up user authorization roles. 

CENTRI Technology

The Seattle-based CENTRI is a security firm that offers IoT-enabled automotive security solutions. As an example, their IoTAS product is a mobile and chip software product designed to keep automobile sensors and navigation systems protected from outside threats.

Dellfer

Another cybersecurity firm offering automotive security solutions is Dellfer, offering a run-time, zero-day mitigation platform that offers endpoint protection from cyberattacks for connected devices. They recently joined forces with one of the world’s largest mobility providers, DENSO, to get their technology installed in vehicles. 

Digital.ai 

Digital.ai, formerly known as Arxan, offers software security solutions for desktops, servers, mobile devices, and IoT-based embedded platforms. It utilizes string encryption, renaming, and code obfuscation to defend applications against cyberattacks. Automotive security has become a major focus for the company over the last few years as well. 

Harrman

Based out of Connecticut and owned by Samsung, Harman is a company offering security products for automotive systems. Their technology is installed in more than fifty million vehicles today. Their core product is the Harman SHIELD, which is designed to secure entry points in a connected vehicle’s network and was designed with IBM. 

Intertrust 

Intertrust is a software security firm located in Silicon Valley. Its essential software product is the WhiteCryption, a software product designed to secure a vehicle’s network (including its infotainment center and the functions of the vehicle itself) as well as encrypt the driver’s personal information. 

Ixia

Ixia is a company offering security resiliency solutions designed to secure and validate both physical and virtual networks for individuals and businesses. Their top products include the BreakingPoint (a performance testing product) and the ThreatARMOR (a threat intelligence security device). 

NVIDIA

NVIDIA is a technology company offering solutions such as the Xavier Architecture and the Drive OS, which is a functional safety operating system that includes a comprehensive security model (including a firewall and regular over-the-air software security updates) as part of its software. 

VisualThreat 

VisualThreat is one of the leading car security vendors and is currently based out of California. The company’s chief product is an end-to-end connected vehicle security solution in the form of the Vehicle CyberSecurity Protection Framework. The company’s background is boosting security for auto-based mobile apps and telematics units

Conclusion

How secure is your vehicle? Hopefully, you’ve asked yourself this question after reading this article. Just because the auto industry has become a prime target for hackers doesn’t mean you have to resign yourself to thinking that it’s inevitable your vehicle will become a target. Even as cyber threats against vehicles continue to rise, security vendors, including the ones listed above, are developing new products to counter those attacks.

The post These Ten Startups Are Focused on Protecting Connected Cars From Cyber Attacks appeared first on Cybersecurity Insiders.