BT Sets Out To Tackle Connected Car Security

Apr 23, 2015

As we move deeper into the world of the Internet of Things, and the likes of connected vehicles, there are plenty of worries on the security front about how all these new devices might be exploited – a possibility which BT, for one, is taking seriously.

Indeed, BT has just announced that it’s working on security for the connected car, with the launch of a new BT Assure Ethical Hacking for Vehicles service.

The idea of this is to determine what sort of exposure and danger the connected car might have when it comes to cyber-threats, and to develop appropriate counter-measures.

Threats range from the simple stealing of data related to car systems, through to potential hazards such as the remote hijacking of a vehicle – something the FBI has been concerned about in the past ever since self-driving cars entered testing, relating to potential ‘bombs on wheels’ scenarios.

BT’s ethical hackers will be subjecting cars to a range of tests probing Bluetooth links, USB ports, DVD drives, 3G (or 4G) mobile links and so forth, looking at end-to-end security and picking out potential vulnerabilities.

Hubertus von Roenne, Vice President Global Industry Practices at BT Global Services, commented: “Vehicles are now connected devices, confronting manufacturers and suppliers with a whole new world of security challenges. For example, we have seen cars infected with malware while connected to a power charging station – because nobody had expected this would be possible.

“We use the expertise and knowledge of our Ethical Hacking consultants to identify these vulnerabilities – before others do. BT has decades of experience in securing connected devices and embedded systems across various industries and we are very proud to now offer that experience to the automotive industry.”

Udo Steininger, Head of Assisted and Automated Driving at TÜV SÜD, added: “The industry needs to join forces, including with suppliers, IT security specialists and certification bodies, to agree on a common approach to interfaces and security standards for the Connected Car.”




Author: Darren Allan
View the original article here.
Published under license from ITProPortal.com

Comment

 

Understanding the risks and rewards of public sector cloud 

Download the Whitepaper now

Partner

24Newswire
Sign up to receive latest news