Therefore, by providing real-time information on traffic conditions, road accidents, climate risks, and any type of data related to our safety and comfort, other advantages can be obtained, such as improving the safety of people in the room.
In many countries, insurance companies have been demanding for years to integrate a GPS system (satellite positioning system) into the vehicle in order to be able to protect it. Until today, we no longer talk about GPS connected to the phone or mobile network, if not the entire vehicle.
Internet of Things Attack
Full vehicle connection means that if we find someone stealing it, we can close it immediately, or if for some reason we cannot continue driving the car, then someone you trust can perform this operation remotely during the driver’s recovery. The development of the car can be independent in an emergency to the nearest shelter or hospital.
Reason on Hack and Control Your Car
But like all devices connected to the Internet, poor security configuration or poor device programming can lead to the possibility of an attack, changing the functionality of the vehicle, controlling it remotely, performing remote hijacking or theft, blocking the door or stopping in the middle of the road. vehicle.
On the Internet, researchers can find about 40 million industrial vehicles that can be located and controlled in real time due to poor configuration without the need for advanced knowledge. We are discussing devices that do not require users and passwords to connect and remotely control them.
For security reasons, we cannot provide more details about these vehicles, but if researchers are interested in this issue, we can discuss it at any time.
Insurance companies collect their policies by setting prices based on statistics, driver age, vehicle color, driver’s license age, and driver gender. However, if we consider the new risks that arise when we connect our vehicles to the Internet, all these patterns of consideration lose value.
Simultaneous reading researchers use machine learning to create real-time IoT DDoS detection tools to intercept attack traffic from IoT botnets
The impact of cyber attacks is very extensive, and it seems that there is no insurance to take action in this regard, nor does it pay attention to such information when approving policies.
Cyberattacks have a wide range of advantages for the Internet, but we must be able to minimize the associated risks and make it less attractive to attackers, thereby maximizing the drivers, passengers, pedestrians, other drivers and the vehicle itself. safety.
We must be aware of the related risks and propose ways to ensure the best possible safety levels
Cited a doctorate. Jesus Friginal, apparently “needs formalization and execution of systems that require effective functional and non-functional testing. Functional testing should not only demonstrate what a system should do, but should not do what it should not do.”
Non-functional tests must verify that the system will operate under conditions of pressure, safety, etc., so that the system is in a known and controlled state when any possible condition occurs.
The Internet of Things (IoT), responsible for connecting unthinkable things, now offers the possibility of connecting vehicles to the internet. With this, great advantages are obtained, among others, to increase the security of those who are in their interior by providing real-time information on traffic conditions, incidents on roads, climatological risks and any type of Engaging post, Read More…
thumbnail courtesy of gbhackers.com
If you like to receive more of these curated safe harbor news alerts then subscribe to my mailing list. and come back soon at https://www.safeharboroncyber.com/Blog/ to read further CyberWisdom Safe Harbor Commentaries. Home » Curated SafeHarboronCyber’s CyberWisdom Post »