Automotive Cybersecurity Best Practices

by Gene Carter on July 27, 2016 at 8:59 AM

Recently the Automotive Information Sharing and Analysis Center (Auto-ISAC) released "Automotive Cybersecurity Best Practices" for carmakers and their suppliers. This document expands on their "Framework for Automotive...

Recently, the US Government Accountability Office publicly released GAO-16-350 VEHICLE CYBERSECURITY: DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Real-world Attack.

For...

The Year the World Became Aware of Car Hacking

by Gene Carter on December 15, 2015 at 11:57 AM

Security Innovation has been securing Vehicle-to-Vehicle communications for almost 10 years, but for the average consumer, car hacking only came to light in 2015. As the year draws to an end, here’s a look at some of the...

The Librarian of Congress recently announced exemptions to the Digital Millennium Copyright Act (DMCA) that now make it legal to circumvent specific technological measures that control access to copyrighted works,...

Autonomous automated vehicles (AV), also known as self-driving cars, have been garnering a lot of press coverage over the past year, as automakers (Audi, Mercedes-Benz, GM, Toyota, etc.), Tier 1 suppliers (Delphi, Bosch,...

Last week, the United States House Energy and Commerce Subcommittee on Commerce, Manufacturing, and Trade released a number of staff drafted proposals, a few of which addressed automotive cybersecurity and privacy. On the...

Over recent years, automakers have provided advanced technology within vehicles to help keep drivers safe while on the road. Today, over 50% of vehicles in the United Stated are connected and this number is likely to...

Note: this original blog post was published on Embedded.com; read it here.

Understanding the Connected Car

by Peter Samson on March 3, 2015 at 4:10 PM

The software operating a new car often has a hundred million lines of code – more than a modern fighter jet, or jumbo airliner - spread among 100 or more processors, making the threat surface and number of potential...

Protecting a Vehicle from Hackers

by Peter Samson on February 3, 2015 at 4:15 PM

There is a growing realization of the need to address the cybersecurity and information privacy challenges. New functionality, like connected cars, has highlighted the stark reality that most automobiles were not built to be...