Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Infographic under the hood of a connected car hack

9,736 views

Published on

As vehicles become more connected internally and externally – via wi-fi networks, satellite connections, cellular connectivity and the recent Intelligent Transportation Systems standard – the number of potential ways for an attacker to hack into your vehicle is greater than ever. To learn more visit http://ibmsec.co/TQnxV

Published in: Automotive, Technology
  • You have to choose carefully. ⇒ www.HelpWriting.net ⇐ offers a professional writing service. I highly recommend them. The papers are delivered on time and customers are their first priority. This is their website: ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • My brother found Custom Writing Service ⇒ www.HelpWriting.net ⇐ and ordered a couple of works. Their customer service is outstanding, never left a query unanswered.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Many thanks to your team at Gov-Auctions. Your information was current and very helpful. Keep up the good work you guys. Learn more... 》》》 https://url.cn/FAmVoVtK
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hi guys! Rate my nudes here --- ONAL.ML (Find them in my profile oksi69) I'm looking for a horny guy to chat and meet
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • See how I make over $7,293 a month from home doing REAL online jobs! ■■■ http://ishbv.com/ezpayjobs/pdf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Infographic under the hood of a connected car hack

  1. 1. CONNECTED CAR HACK UNDER THE HOOD OF A new security vulnerabilites all drivers should be aware of. Today’s modern vehicles can contain over 100 processors, many of which control critical systems within the vehicle. Essentially a computer on wheels, the connected car presents MULTIPLE POINTS OF VULNERABILTY PRIMARY ATTACK POINTS CAR GETS HACKED devices which monitor speed, braking, and location. Located underneath the dashboard, the OBD2 port is a physical connection that is highly vulnerable. This diagnostic port is used to connect third-party OBD2 Port that expose vehicle data or functionality. Interfacing with vehicle systems are applications running on the driver’s personal mobile device. These applications may contain binary libraries MOBILE APPLICATIONS Infotainment Engine Locks Brakes System Airbags OBD2 Port EXTRACT BINARY CODE FROM DEVICE REVERSE-ENGINEER SOFTWARE TAMPER WITH BINARY CODE REDEPLOY MALICIOUS SOFTWARE High ThreatModerate ThreatLow Threat Mobile Applications 1 2 3 4 easily hacked if not protected. Typically the primary communication interface of a connected car, the infotainment system hosts high-value and sensitive applications that are INFOTAINMENT SYSTEM 1 & 2 3 4 KEEP SOFTWARE UPDATED: DON’T JAILBREAK YOUR CAR OR DEVICE: CHECK OUTLETS PERIODICALLY: ASK MANUFACTURER IF APPS ARE HARDENED: TO PREVENT IT WHAT YOU CAN DOHOW A CONNECTED HACKABILITY Check with your manufacturer and service provider to make sure you always have the In addition to making your car less secure, it may also void warranties. what you choose to plug in. Make sure you know what is plugged into any USB or OBD2 ports on your vehicle. Carefully consider latest version installed. to download. Verify that all mobile and pre-installed apps are hardened, in addition to any third-party apps you choose VEHICLE TO VEHICLE VEHICLE TOVEHICLE TO DEVICE NFC 802.11p 802.11p INFRASTRUCTURE What’s 802.11p? A new wireless standard that enables ITS or Intelligent Transportation Systems. Did you know? By 2020, it’s expected that 75% of cars shipped globally will have internet connectivity. Reverse-engineering tools (i.e. IDA pro) are fast, low in cost and easy-to-use.

×