Major Automakers Forge Alliance to Combat Cyberattackers


If you take a few minutes to think about what hackers go after, you’ll realize that it is anything that has an Internet connection. Thanks to the Internet of Things (IoT) and the increased connectivity in machine to machine (M2M) applications, that covers a lot of ground.

In July of this year, two computer security researchers demonstrated that they could easily take control of a moving Jeep Cherokee. This was accomplished using the car’s wireless communications system, which immediately raised new questions about the safety of Internet-connected cars.

They were able to control the vehicle’s air conditioning blasting cold air at the maximum setting. In addition, they were also able to take control of the radio and switch stations, as well as manipulate the volume. Not only were they able to operate internal features, they sprayed the windshield with wiper fluid and turned the wipers on.

Image via Shutterstock

You may think that would be enough, but the two hackers took the opportunity to present an image of themselves on the car’s digital display. It seems the company’s Internet-connected platform Uconnect, which is used to bring entertainment and navigation features to cars, has a big security hole.

I can understand that there is a time for secrecy when it concerns something like national security; what I cannot understand is why Fiat Chrysler Automobiles, maker of the Jeep Cherokee, waited 18 months before telling safety regulators about this issue.

In what we can assume is a response to the July incident, the Alliance of Automobile Manufacturers and the Association of Global Automakers are forming a new group. The result is the Information Sharing and Analysis Center (ISAC), which is an attempt of offer greater cooperation between automakers when it comes to dealing with cyber threats.

The Alliance of Automobile Manufacturers is an association of 12 car and light truck manufacturers that includes BMW Group, Fiat Chrysler LLC, Ford Motor Company, General Motors Company, Jaguar Land Rover, Mazda, Mercedes-Benz USA, Mitsubishi Motors, Porsche Cars North America, Toyota, Volkswagen Group of American and Volvo Cars of North America.

There are still a lot of details to work out but the hope is that this will be a place where the industry can collaborate in an effort to ensure vehicle security. The expectation is that there will be a full-time staff of security experts designed to deal with and predict security threats. Most major automakers and a host of suppliers will join.

In addition to the hack in July, the month also saw Sen. Markey and Sen. Richard Blumenthal (D-Conn.), introduce a bill  to establish a clear set of security standards for automakers to adhere to with their connected technology.

Edited by Dominick Sorrentino

TechZone360 Contributing Writer

Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More