Call Today

+1 440-322-ILER(4537)

}
Hours

Mon – Fri, 9am to 5pm

Tech Blog

your go-to resource for all things tech! Stay updated on the latest trends, industry insights, and expert tips to navigate the ever-evolving world of technology.

A New Era of Hacking, Part 1

by | Nov 13, 2015

You have heard of phones, tablets, and computers being hacked. You may have even heard of industrial equipment being hacked. But did you know that vehicles are increasingly finding themselves in a digital attacker’s crosshairs? Vehicles have had computers for a while, but only recently have they found themselves with onboard bluetooth and wifi network systems. These features can provide utility, entertainment, or safety to anybody using them, but they also provide a way for attackers to gain a foothold into a car’s computer system. These systems can be linked with braking, steering, entry, safety, power, and ignition. This is not a hypothetical situation. Fiat Chrysler recalled 1.4 million cars this year in relation to a Jeep Cherokee that was remotely controlled by security researchers that broke into it’s internet connected entertainment system. The attack did not require anything more than off-the-shelf radio components, a laptop, and knowledge of the system. On top of this, it can be done from anywhere in the world. Some would say that the difficulty in discovering such a vulnerability is high enough to keep a large number of people from pulling it off. However, if an experienced hacker can sell his attack to someone less qualified and far more malicious, the attack could become widespread.

It might soothe you think that the vehicles will be patched and fixed in short order, but the reality is very different. The update cannot be applied automatically. It must be brought into a certified service center to be patched. If people are not aware of the gravity of this problem, then they will not likely get it fixed. The good news is that the the publicity of this vulnerability has forced a change in tack in the automotive industry. Manufacturers are already beginning to secure car computer systems by isolating things like entertainment networks from control systems essential to the car’s core functionality. On top of this emergency connections like OnStar are working to prevent anybody but them from accessing cars on their network or encrypting and verifying traffic using financial-grade security systems.

Hope is not lost! Any car you buy in the future will likely be much more secure than those in the latest generation of vehicles. In the meantime, keep a lookout for a potential car’s security problems before you buy it. One easy way is to make sure it doesn’t use a Wifi connection. Other types of attacks, such as those through bluetooth or a wireless key fob, are less likely as attackers need to be nearby to exploit a car’s computers. Even so, manufactures are also securing these systems so that the future of your transportation is safer and more secure.

Sources:

http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

http://www.ptclwg.com/news/the-most-hackable-cars-on-the-road-1

https://www.youtube.com/watch?v=MK0SrxBC1xs

A New Era of Hacking, Part 1

Mobile Device Security for Small Businesses: How Easily Your Phone Can Be Tracked

Mobile device security for small businesses is no longer optional. Learn how your phone can be tracked, signs of compromise, and steps to secure your business today.

A New Era of Hacking, Part 1

Why Compliance for Small Businesses in 2025 Is Non-Negotiable

Regulatory compliance for small businesses in 2025 is no longer optional. Learn why HIPAA, PCI DSS, and FTC rules matter—and how to stay protected.

A New Era of Hacking, Part 1

The Hidden Dangers of Cheap Managed IT Services

Cheap managed IT services may seem like a deal, but hidden costs and weak coverage can put your business at serious risk. Here’s what to watch out for.

A New Era of Hacking, Part 1

Windows 10 End of Life for Businesses: Why Delaying the Upgrade Could Cost You Big

Windows 10 End of Life for Businesses is coming October 14, 2025. Learn why waiting to upgrade puts your data, compliance, and bottom line at serious risk.

A New Era of Hacking, Part 1

How Out-of-Office E-mails Create Cybersecurity Risks for Small Businesses

Out-of-office replies may seem harmless, but they can open the door to phishing and fraud. Learn how to reduce cybersecurity risks for small businesses with simple IT strategies.