SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
CONNECTED CAR
HACK
UNDER THE HOOD OF A
new security vulnerabilites all drivers should be aware of.
Today’s modern vehicles can contain over 100 processors,
many of which control critical systems within the vehicle.
Essentially a computer on wheels, the connected car presents
MULTIPLE POINTS OF VULNERABILTY
PRIMARY ATTACK POINTS
CAR GETS HACKED
devices which monitor speed, braking, and location.
Located underneath the dashboard, the OBD2 port
is a physical connection that is highly vulnerable.
This diagnostic port is used to connect third-party
OBD2 Port
that expose vehicle data or functionality.
Interfacing with vehicle systems are applications
running on the driver’s personal mobile device.
These applications may contain binary libraries
MOBILE APPLICATIONS
Infotainment
Engine
Locks
Brakes
System
Airbags
OBD2 Port
EXTRACT BINARY CODE
FROM DEVICE
REVERSE-ENGINEER
SOFTWARE
TAMPER WITH
BINARY CODE
REDEPLOY
MALICIOUS SOFTWARE
High ThreatModerate ThreatLow Threat
Mobile
Applications
1
2
3
4
easily hacked if not protected.
Typically the primary communication interface of
a connected car, the infotainment system hosts
high-value and sensitive applications that are
INFOTAINMENT SYSTEM
1
&
2
3
4
KEEP SOFTWARE
UPDATED:
DON’T JAILBREAK
YOUR CAR OR DEVICE:
CHECK OUTLETS
PERIODICALLY:
ASK MANUFACTURER
IF APPS ARE HARDENED:
TO PREVENT IT
WHAT YOU CAN DOHOW A CONNECTED
HACKABILITY
Check with your manufacturer
and service provider to make
sure you always have the
In addition to making your car
less secure, it may also void
warranties.
what you choose to plug in.
Make sure you know what is
plugged into any USB or OBD2 ports
on your vehicle. Carefully consider
latest version installed.
to download.
Verify that all mobile and pre-installed
apps are hardened, in addition to
any third-party apps you choose
VEHICLE TO VEHICLE VEHICLE TOVEHICLE TO DEVICE
NFC
802.11p
802.11p
INFRASTRUCTURE
What’s 802.11p?
A new wireless standard that
enables ITS or Intelligent
Transportation Systems.
Did you know?
By 2020, it’s expected that
75% of cars shipped globally
will have internet connectivity.
Reverse-engineering
tools (i.e. IDA pro) are
fast, low in cost and
easy-to-use.

Contenu connexe

Tendances

Current Landscape of Connected Car APIs
Current Landscape of Connected Car APIsCurrent Landscape of Connected Car APIs
Current Landscape of Connected Car APIsLiz Slocum
 
DWS15 - Connected things forum - conclusive keynote - Raj Talluri
DWS15 - Connected things forum - conclusive keynote - Raj TalluriDWS15 - Connected things forum - conclusive keynote - Raj Talluri
DWS15 - Connected things forum - conclusive keynote - Raj TalluriIDATE DigiWorld
 
George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014Rick Huijbregts
 
Infographic: The State of Mobile Insecurity
Infographic: The State of Mobile InsecurityInfographic: The State of Mobile Insecurity
Infographic: The State of Mobile InsecurityIBM Security
 
Autonomous Driving: Philosophical Changes in Insurance and Public Readiness
Autonomous Driving: Philosophical Changes in Insurance and Public ReadinessAutonomous Driving: Philosophical Changes in Insurance and Public Readiness
Autonomous Driving: Philosophical Changes in Insurance and Public ReadinessELEKS
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017Craig Hurst
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014MOTC Qatar
 
Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things Ericsson
 
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...itnewsafrica
 
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...itnewsafrica
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 
Oies_IoT_week_lisbon_201506_wearablesfieldservice_final
Oies_IoT_week_lisbon_201506_wearablesfieldservice_finalOies_IoT_week_lisbon_201506_wearablesfieldservice_final
Oies_IoT_week_lisbon_201506_wearablesfieldservice_finalFrancisco Maroto
 
New Technology - our opportunities in the meeting industry
New Technology - our opportunities in the meeting industryNew Technology - our opportunities in the meeting industry
New Technology - our opportunities in the meeting industryMobilimeet
 
Oies io t_week_lisbon_201506_social_iot_final
Oies io t_week_lisbon_201506_social_iot_finalOies io t_week_lisbon_201506_social_iot_final
Oies io t_week_lisbon_201506_social_iot_finalFrancisco Maroto
 
AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19Assem mousa
 
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info
 
Investing in Drone Technology - VC Case Interview
Investing in Drone Technology - VC Case InterviewInvesting in Drone Technology - VC Case Interview
Investing in Drone Technology - VC Case InterviewShifali Gupta
 

Tendances (20)

Current Landscape of Connected Car APIs
Current Landscape of Connected Car APIsCurrent Landscape of Connected Car APIs
Current Landscape of Connected Car APIs
 
DWS15 - Connected things forum - conclusive keynote - Raj Talluri
DWS15 - Connected things forum - conclusive keynote - Raj TalluriDWS15 - Connected things forum - conclusive keynote - Raj Talluri
DWS15 - Connected things forum - conclusive keynote - Raj Talluri
 
George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014
 
Infographic: The State of Mobile Insecurity
Infographic: The State of Mobile InsecurityInfographic: The State of Mobile Insecurity
Infographic: The State of Mobile Insecurity
 
Autonomous Driving: Philosophical Changes in Insurance and Public Readiness
Autonomous Driving: Philosophical Changes in Insurance and Public ReadinessAutonomous Driving: Philosophical Changes in Insurance and Public Readiness
Autonomous Driving: Philosophical Changes in Insurance and Public Readiness
 
Internet of vehical
Internet of vehicalInternet of vehical
Internet of vehical
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014
 
Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things
 
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
 
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
The Mobile Lawyer In The Cloud In 2015
The Mobile Lawyer In The Cloud In 2015The Mobile Lawyer In The Cloud In 2015
The Mobile Lawyer In The Cloud In 2015
 
Oies_IoT_week_lisbon_201506_wearablesfieldservice_final
Oies_IoT_week_lisbon_201506_wearablesfieldservice_finalOies_IoT_week_lisbon_201506_wearablesfieldservice_final
Oies_IoT_week_lisbon_201506_wearablesfieldservice_final
 
New Technology - our opportunities in the meeting industry
New Technology - our opportunities in the meeting industryNew Technology - our opportunities in the meeting industry
New Technology - our opportunities in the meeting industry
 
Oies io t_week_lisbon_201506_social_iot_final
Oies io t_week_lisbon_201506_social_iot_finalOies io t_week_lisbon_201506_social_iot_final
Oies io t_week_lisbon_201506_social_iot_final
 
AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19
 
Freemium internet
Freemium internetFreemium internet
Freemium internet
 
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
 
Investing in Drone Technology - VC Case Interview
Investing in Drone Technology - VC Case InterviewInvesting in Drone Technology - VC Case Interview
Investing in Drone Technology - VC Case Interview
 

Similaire à Connected Car Hacking: OBD2 Port & Mobile Apps Top Vulnerabilities

Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
connected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersChristopher Porter
 
Connected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersNick Rossmann
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threatHarman Innovation
 
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxSeminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxsaketkumar128143
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securitypptSachin Roy
 
Forklift Impact Management in Real Time
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real TimeTed Jurca
 
Forklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyTed Jurca
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirateswebnowires
 
Forklift Impact Management, Defender system
Forklift Impact Management, Defender systemForklift Impact Management, Defender system
Forklift Impact Management, Defender systemTed Jurca
 
Parking Automation System
Parking Automation SystemParking Automation System
Parking Automation SystemSUSHANT DHANAVE
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Gilad Bandel
 
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!NoNameCon
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Communication Devices Inc
 

Similaire à Connected Car Hacking: OBD2 Port & Mobile Apps Top Vulnerabilities (20)

Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
connected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackers
 
Connected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for Hackers
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxSeminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
hamaa2.pdf
hamaa2.pdfhamaa2.pdf
hamaa2.pdf
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
Forklift Impact Management in Real Time
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real Time
 
Forklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh Technology
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirates
 
Forklift Impact Management, Defender system
Forklift Impact Management, Defender systemForklift Impact Management, Defender system
Forklift Impact Management, Defender system
 
Parking Automation System
Parking Automation SystemParking Automation System
Parking Automation System
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?
 
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 

Plus de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Plus de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Dernier

Welcome to Auto Know University Orientation
Welcome to Auto Know University OrientationWelcome to Auto Know University Orientation
Welcome to Auto Know University Orientationxlr8sales
 
Infineon-Infineon_DC_EV_Charging_Trends_and_system_solutions-ApplicationPrese...
Infineon-Infineon_DC_EV_Charging_Trends_and_system_solutions-ApplicationPrese...Infineon-Infineon_DC_EV_Charging_Trends_and_system_solutions-ApplicationPrese...
Infineon-Infineon_DC_EV_Charging_Trends_and_system_solutions-ApplicationPrese...IEABODI2SnVVnGimcEAI
 
Increasing Community Impact with Meaningful Engagement by Brytanee Brown
Increasing Community Impact with Meaningful Engagement by Brytanee BrownIncreasing Community Impact with Meaningful Engagement by Brytanee Brown
Increasing Community Impact with Meaningful Engagement by Brytanee BrownForth
 
Bizwerx Innovation & Mobility Hub by Dr. Cassandra Little
Bizwerx Innovation & Mobility Hub by Dr. Cassandra LittleBizwerx Innovation & Mobility Hub by Dr. Cassandra Little
Bizwerx Innovation & Mobility Hub by Dr. Cassandra LittleForth
 
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道7283h7lh
 
Clean Mobility Options Program by Sarah Huang
Clean Mobility Options Program by Sarah HuangClean Mobility Options Program by Sarah Huang
Clean Mobility Options Program by Sarah HuangForth
 
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILESABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILESsriharshaganjam1
 
Human Resource Practices TATA MOTORS.pdf
Human Resource Practices TATA MOTORS.pdfHuman Resource Practices TATA MOTORS.pdf
Human Resource Practices TATA MOTORS.pdfAditiMishra247289
 

Dernier (8)

Welcome to Auto Know University Orientation
Welcome to Auto Know University OrientationWelcome to Auto Know University Orientation
Welcome to Auto Know University Orientation
 
Infineon-Infineon_DC_EV_Charging_Trends_and_system_solutions-ApplicationPrese...
Infineon-Infineon_DC_EV_Charging_Trends_and_system_solutions-ApplicationPrese...Infineon-Infineon_DC_EV_Charging_Trends_and_system_solutions-ApplicationPrese...
Infineon-Infineon_DC_EV_Charging_Trends_and_system_solutions-ApplicationPrese...
 
Increasing Community Impact with Meaningful Engagement by Brytanee Brown
Increasing Community Impact with Meaningful Engagement by Brytanee BrownIncreasing Community Impact with Meaningful Engagement by Brytanee Brown
Increasing Community Impact with Meaningful Engagement by Brytanee Brown
 
Bizwerx Innovation & Mobility Hub by Dr. Cassandra Little
Bizwerx Innovation & Mobility Hub by Dr. Cassandra LittleBizwerx Innovation & Mobility Hub by Dr. Cassandra Little
Bizwerx Innovation & Mobility Hub by Dr. Cassandra Little
 
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
怎么办理美国UCONN毕业证康涅狄格大学学位证书一手渠道
 
Clean Mobility Options Program by Sarah Huang
Clean Mobility Options Program by Sarah HuangClean Mobility Options Program by Sarah Huang
Clean Mobility Options Program by Sarah Huang
 
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILESABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
ABOUT REGENERATIVE BRAKING SYSTEM ON AUTOMOBILES
 
Human Resource Practices TATA MOTORS.pdf
Human Resource Practices TATA MOTORS.pdfHuman Resource Practices TATA MOTORS.pdf
Human Resource Practices TATA MOTORS.pdf
 

Connected Car Hacking: OBD2 Port & Mobile Apps Top Vulnerabilities

  • 1. CONNECTED CAR HACK UNDER THE HOOD OF A new security vulnerabilites all drivers should be aware of. Today’s modern vehicles can contain over 100 processors, many of which control critical systems within the vehicle. Essentially a computer on wheels, the connected car presents MULTIPLE POINTS OF VULNERABILTY PRIMARY ATTACK POINTS CAR GETS HACKED devices which monitor speed, braking, and location. Located underneath the dashboard, the OBD2 port is a physical connection that is highly vulnerable. This diagnostic port is used to connect third-party OBD2 Port that expose vehicle data or functionality. Interfacing with vehicle systems are applications running on the driver’s personal mobile device. These applications may contain binary libraries MOBILE APPLICATIONS Infotainment Engine Locks Brakes System Airbags OBD2 Port EXTRACT BINARY CODE FROM DEVICE REVERSE-ENGINEER SOFTWARE TAMPER WITH BINARY CODE REDEPLOY MALICIOUS SOFTWARE High ThreatModerate ThreatLow Threat Mobile Applications 1 2 3 4 easily hacked if not protected. Typically the primary communication interface of a connected car, the infotainment system hosts high-value and sensitive applications that are INFOTAINMENT SYSTEM 1 & 2 3 4 KEEP SOFTWARE UPDATED: DON’T JAILBREAK YOUR CAR OR DEVICE: CHECK OUTLETS PERIODICALLY: ASK MANUFACTURER IF APPS ARE HARDENED: TO PREVENT IT WHAT YOU CAN DOHOW A CONNECTED HACKABILITY Check with your manufacturer and service provider to make sure you always have the In addition to making your car less secure, it may also void warranties. what you choose to plug in. Make sure you know what is plugged into any USB or OBD2 ports on your vehicle. Carefully consider latest version installed. to download. Verify that all mobile and pre-installed apps are hardened, in addition to any third-party apps you choose VEHICLE TO VEHICLE VEHICLE TOVEHICLE TO DEVICE NFC 802.11p 802.11p INFRASTRUCTURE What’s 802.11p? A new wireless standard that enables ITS or Intelligent Transportation Systems. Did you know? By 2020, it’s expected that 75% of cars shipped globally will have internet connectivity. Reverse-engineering tools (i.e. IDA pro) are fast, low in cost and easy-to-use.