Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › AutoMobile › Report: Most cars are vulnerable to hacking

    Report: Most cars are vulnerable to hacking

    By Vikram Singh RaoJuly 6, 2016
    Facebook Twitter Reddit LinkedIn
    car hacking kespersky

    The automobile industry in the recent past has gone a notch higher in the technology arena. The automakers have crammed cars with the most sophisticated wireless technology in attempt to buoy the user from the possible Car hacking who eventually takes control of the or worse, steal the personal data.

    The recent reports from senator Ed Markel has warned that, with the increasing complexity on the technical bit of vehicles have compromised the driver’s privacy and putting him/her at risk and possible Car hacking. He further say that drivers have relied on this technology but the automakers have not given enough thought on how to cushion them from the impeding dangers. The hackers achieve their malicious motive by privacy inversion or possible cyber attacks. He points out that the technology systems in the cars or trucks are highly compromised and data remains highly unprotected.

    Markel has sought an in-depth understanding on how well various automakers protect and secure technology in the vehicles against the hackers. He further inquired how the vehicle computer gather information and then submit wirelessly. He sent these inquiries to twenty different automobile companies. These automakers included Toyota, ford and general motors.

    Markel came up with these questions after the proof of the researchers that, hackers can get hold of the control of vehicles’ control system, causing them to accelerate, or turn the horn on, or turn the headlights on and off or even modify the vehicle’s speedometer and fuel gauge reading.

    16 automobile manufacturers responded. They revealed that proper security measures to ensure that drivers were protected against hackers were not sufficient and therefore they contained loopholes. The hackers therefore have the actual control of the vehicle and collect the personal data of the driver. This was a revelation of Markel’s staff.

    Cyber security expertise has given a warning which indicates that the electronic system would be vulnerable. This became alarming when manufactures began to build wireless connections. The researcher demonstrated using a laptop on how control the vehicle. They connected the laptop to the vehicle using a cable. It clearly demonstrated how one can control the steering wheel or apply the brakes. They used these demonstrations on the ford and Toyota prius car models. A report has also been released on how the vehicles may be attacked and controlled using the wi-fi and the keyless entry system.

    The senator Markel has called for national highway traffic safety administration to come up with new regulations in conjunction with the federal trade commission. The new standards should ensure that the wireless and the data collection features adequately protects against hacking and any possible hacking. The recommendations requires that, automakers make painstaking tests on the penetration systems ,and ensure that the drivers are aware of how the data is collected and used.

    Image Source: KesperSky

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Vikram Singh Rao
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    I am an entrepreneur at heart who has made his hobby turned a passion, his profession now.

    Related Posts

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024

    Navigating the Waters: Best Practices for Phishing Testing in 2024

    February 19, 2024
    Lists You May Like

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.