How to Protect Your Car and Yourself Against Car Hacking

FAA Clamps Down on UAVs – How Useful Will Registration Be?
October, 2015
wearable technology market
Global Wearable Technologies Market Forecast to 2025
February, 2016

How to Protect Your Car and Yourself Against Car Hacking

According to Market Info Group (MiG), security holes currently allow an hacker to take a PC, physically connect it to the Ethernet network inside a car and use a software command to take control of the vehicle. Alternately, hackers could infect the system with a Trojan, which would let them take control of an engine remotely, while a person is driving the car. A true nightmare scenario.

As cars rapidly become more autonomous and more computer controlled, car hacking is certain to become a huge concern for manufacturers, regulators and of course drivers. Signs of this encroaching crisis are already visible. (wired.com, cnet.com)

According to Market Info Group (MiG), security holes currently allow an hacker to take a PC, physically connect it to the Ethernet network inside a car and use a software command to take control of the vehicle. Alternately, hackers could infect the system with a Trojan, which would let them take control of an engine remotely, while a person is driving the car. A true nightmare scenario.

While vehicle security is largely in the hands of auto manufacturers, MiG can offer a few tips on how to protect your car against hackers:

  • Wireless Systems:  If you are purchasing a new car, acquaint yourself with the wireless systems to find out if any of the systems can be operated remotely.
  • Auto Security And Information Service: If you are using an auto security and information service, like OnStar, make sure you don’t leave OnStar-related documents or your password in the car, because services like  OnStar can remotely shut off your engine. If you report the vehicle stolen, there is the potential for mischief if your password falls in the wrong hands.
  • Keep Track Over After-Market Devices:  Generally speaking, after-market car systems are not  rigorously tested or designed, exposing the buyer to undesirable vulnerabilities.
  • Remote Shutdown Utility: Ask about remote shutdown related to repossession if you are financing through the company from which you purchased the vehicle. Ensure that the seller has security measures in place that control access to the system.

Cyber Security is a huge concern these days, which is why MiG produced a uniquely detailed analysis and forecast of the cyber weapons universe – both offensive and defensive, governmental and private. The study, titled: “Cyber Weapons (Offensive and Defensive) for Government and Private Sectors Global Market and Technologies Forecast, 2015-2026” includes a rare view into the black market side of this robust industry, and provides a surprising insight into the trends and forces driving this market and into the non-linear future it faces.

Global Cyber Weapons Market by Type

Global Cyber Weapons Market by Type

To learn more about this market, please follow this link.

AMSTERDAM and COLORADO SPRINGS, Feb. 22, 2017 /Newswire/ — Market Forecast a subsidiary of ASD Media BV and a leader of aerospace & defense market research solutions and services, has completed its acquisition of the Market Info Group (MIG), a global creator of reliable and unbiased defense industry research reports and consulting services for more than 7 years. The Market Info Group businesses’ assets are being integrated with Market Forecast, enabling existing services to be enhanced and creating huge new opportunities for clients of both services.

This website is still visable, but full information and purchase of all market studies is now available on Market Forecast