The most pressing cybersecurity concern over the next decade won’t be Facebook or other social media platforms, but automobiles. And here’s the reason, as we move toward smart cars and self-driving automobiles there is a major concern that they could be hacked and the cars used as weapons. Imagine it, a hacker, terrorists, or just someone will ill intent takes over the cyber controls of a fleet of cars as directs them to actually perform hit and runs?
“At present, there are about 50 million vehicles in the United States that have Internet connectivity. That’s about 20 percent of all vehicles on the road. That percentage will sharply increase starting with the 2020 model year due to a commitment by all of the major manufacturers to add connectivity features to many new models going forward. Ford, GM, and Toyota plan to have all of their vehicles connected to the internet starting with this upcoming model year. That would mean about 17 million new ‘connected cars’ on American roads each year,” CPO Magazine reported.
Listen to GHOGH with Jamarlin Martin | Episode 68: Jamarlin Martin Jamarlin talks about the recent backlash against Lebron James for not speaking up for Joshua Wong and the violent Hong Kong protestors.
The potential danger is real. According to a new report, if a ‘fleet-wide’ attack were to occur, 3.75 million connected cars would be infected and over a quarter of a million drivers could be on the road at the time of the attack. This would lead to over 130,000 injuries and 3,000 deaths. The estimated death toll would be slightly greater than that of the September 11 attacks, making this a valid national security concern,” CPO Magazine reported.
How easy would it be to hack into cars? Pretty easy, say cybersecurity experts. And, in fact, hackers have already done so.
Chinese hackers showed how easy it was to hack into Tesla’s Autopilot self-driving software and it “tricked” the car into swerving into an oncoming traffic lane.
Cybersecurity researchers from Keen Security Labs in China put bright-colored stickers on the road to create a “fake lane” and this caused a Tesla Model S’s self-driving software to drive from the correct driving lane into the opposing lane on a test course. In a real-life situation, the Tesla would have most likely crashed into oncoming traffic.
“Tesla autopilot module’s lane recognition function has a good robustness in an ordinary external environment (no strong light, rain, snow, sand and dust interference), but it still doesn’t handle the situation correctly in our test scenario,” Keen Security Labs wrote in its published report.
″[T]his kind of attack is simple to deploy,” according to the researchers at Keen Security Labs, which is run by the Chinese tech giant Tencent, and they noted that it is “easy to obtain” the simple circular stickers they used to pull off the stunt.
A Tesla spokesperson sent a statement to CNBC Make It that pointed out that in the Keen Security Labs’ tests “the physical environment around the vehicle is artificially altered.” The Tesla spokesperson added that the vulnerability “is not a realistic concern given that a driver can easily override Autopilot at any time by using the steering wheel or brakes and should always be prepared to do so, and can manually operate the windshield wiper settings at all times.”
In another hacking experiment, a group of researchers at the University of South Carolina said they fooled the Tesla Model S’s autopilot system “into perceiving objects where none existed or in other cases to miss a real object in Tesla’s path,” The Guardian reported.
Currently, according to federal law in the U.S. requires that any cars with autonomous technology must have conventional driver controls so that a human can take control of the vehicle.
Would you like to get published on this Popular Blog? You can now email Cyprian Nyakundi any breaking news, Exposes, story ideas, human interest articles or interesting videos on: email@example.com. Videos and pictures can be sent to +254 710 280 973 on WhatsApp, Signal and Telegram.