Infographic under the hood of a connected car hack

IBM Security
IBM SecurityIBM Security
CONNECTED CAR
HACK
UNDER THE HOOD OF A
new security vulnerabilites all drivers should be aware of.
Today’s modern vehicles can contain over 100 processors,
many of which control critical systems within the vehicle.
Essentially a computer on wheels, the connected car presents
MULTIPLE POINTS OF VULNERABILTY
PRIMARY ATTACK POINTS
CAR GETS HACKED
devices which monitor speed, braking, and location.
Located underneath the dashboard, the OBD2 port
is a physical connection that is highly vulnerable.
This diagnostic port is used to connect third-party
OBD2 Port
that expose vehicle data or functionality.
Interfacing with vehicle systems are applications
running on the driver’s personal mobile device.
These applications may contain binary libraries
MOBILE APPLICATIONS
Infotainment
Engine
Locks
Brakes
System
Airbags
OBD2 Port
EXTRACT BINARY CODE
FROM DEVICE
REVERSE-ENGINEER
SOFTWARE
TAMPER WITH
BINARY CODE
REDEPLOY
MALICIOUS SOFTWARE
High ThreatModerate ThreatLow Threat
Mobile
Applications
1
2
3
4
easily hacked if not protected.
Typically the primary communication interface of
a connected car, the infotainment system hosts
high-value and sensitive applications that are
INFOTAINMENT SYSTEM
1
&
2
3
4
KEEP SOFTWARE
UPDATED:
DON’T JAILBREAK
YOUR CAR OR DEVICE:
CHECK OUTLETS
PERIODICALLY:
ASK MANUFACTURER
IF APPS ARE HARDENED:
TO PREVENT IT
WHAT YOU CAN DOHOW A CONNECTED
HACKABILITY
Check with your manufacturer
and service provider to make
sure you always have the
In addition to making your car
less secure, it may also void
warranties.
what you choose to plug in.
Make sure you know what is
plugged into any USB or OBD2 ports
on your vehicle. Carefully consider
latest version installed.
to download.
Verify that all mobile and pre-installed
apps are hardened, in addition to
any third-party apps you choose
VEHICLE TO VEHICLE VEHICLE TOVEHICLE TO DEVICE
NFC
802.11p
802.11p
INFRASTRUCTURE
What’s 802.11p?
A new wireless standard that
enables ITS or Intelligent
Transportation Systems.
Did you know?
By 2020, it’s expected that
75% of cars shipped globally
will have internet connectivity.
Reverse-engineering
tools (i.e. IDA pro) are
fast, low in cost and
easy-to-use.

Recomendados

FASTRInfographic2017 por
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017Craig Hurst
267 visualizações1 slide
ConsumerLab: Public safety goes personal - presentation por
ConsumerLab: Public safety goes personal - presentationConsumerLab: Public safety goes personal - presentation
ConsumerLab: Public safety goes personal - presentationEricsson
677 visualizações20 slides
Connected Car APIs and Connectivity por
Connected Car APIs and ConnectivityConnected Car APIs and Connectivity
Connected Car APIs and ConnectivityLiz Slocum
1.6K visualizações15 slides
The 10 hot consumer trends for 2016 - Presentation por
The 10 hot consumer trends for 2016 - PresentationThe 10 hot consumer trends for 2016 - Presentation
The 10 hot consumer trends for 2016 - PresentationEricsson
1.2K visualizações13 slides
Connected & Autonomous vehicles: cybersecurity on a grand scale v1 por
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Bill Harpley
1.6K visualizações32 slides
Kevin Crews at the UK Recruiter Recruitment Conference 2013 por
Kevin Crews at the UK Recruiter Recruitment Conference 2013Kevin Crews at the UK Recruiter Recruitment Conference 2013
Kevin Crews at the UK Recruiter Recruitment Conference 2013ukrecruiter
865 visualizações74 slides

Mais conteúdo relacionado

Mais procurados

Current Landscape of Connected Car APIs por
Current Landscape of Connected Car APIsCurrent Landscape of Connected Car APIs
Current Landscape of Connected Car APIsLiz Slocum
4.2K visualizações19 slides
DWS15 - Connected things forum - conclusive keynote - Raj Talluri por
DWS15 - Connected things forum - conclusive keynote - Raj TalluriDWS15 - Connected things forum - conclusive keynote - Raj Talluri
DWS15 - Connected things forum - conclusive keynote - Raj TalluriIDATE DigiWorld
825 visualizações22 slides
George Brown College - TECH DAY 2014 por
George Brown College - TECH DAY 2014George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014Rick Huijbregts
1.2K visualizações45 slides
Infographic: The State of Mobile Insecurity por
Infographic: The State of Mobile InsecurityInfographic: The State of Mobile Insecurity
Infographic: The State of Mobile InsecurityIBM Security
6K visualizações1 slide
Autonomous Driving: Philosophical Changes in Insurance and Public Readiness por
Autonomous Driving: Philosophical Changes in Insurance and Public ReadinessAutonomous Driving: Philosophical Changes in Insurance and Public Readiness
Autonomous Driving: Philosophical Changes in Insurance and Public ReadinessELEKS
36 visualizações10 slides
Internet of vehical por
Internet of vehicalInternet of vehical
Internet of vehicalkalyani jadhav
314 visualizações17 slides

Mais procurados(20)

Current Landscape of Connected Car APIs por Liz Slocum
Current Landscape of Connected Car APIsCurrent Landscape of Connected Car APIs
Current Landscape of Connected Car APIs
Liz Slocum4.2K visualizações
DWS15 - Connected things forum - conclusive keynote - Raj Talluri por IDATE DigiWorld
DWS15 - Connected things forum - conclusive keynote - Raj TalluriDWS15 - Connected things forum - conclusive keynote - Raj Talluri
DWS15 - Connected things forum - conclusive keynote - Raj Talluri
IDATE DigiWorld825 visualizações
George Brown College - TECH DAY 2014 por Rick Huijbregts
George Brown College - TECH DAY 2014George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014
Rick Huijbregts1.2K visualizações
Infographic: The State of Mobile Insecurity por IBM Security
Infographic: The State of Mobile InsecurityInfographic: The State of Mobile Insecurity
Infographic: The State of Mobile Insecurity
IBM Security6K visualizações
Autonomous Driving: Philosophical Changes in Insurance and Public Readiness por ELEKS
Autonomous Driving: Philosophical Changes in Insurance and Public ReadinessAutonomous Driving: Philosophical Changes in Insurance and Public Readiness
Autonomous Driving: Philosophical Changes in Insurance and Public Readiness
ELEKS 36 visualizações
Internet of vehical por kalyani jadhav
Internet of vehicalInternet of vehical
Internet of vehical
kalyani jadhav314 visualizações
FASTR_Overview2017 por Craig Hurst
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
Craig Hurst170 visualizações
TOP TEN: Big Data_ Issue 16 _ Dec 2014 por MOTC Qatar
TOP TEN: Big Data_ Issue 16 _ Dec 2014TOP TEN: Big Data_ Issue 16 _ Dec 2014
TOP TEN: Big Data_ Issue 16 _ Dec 2014
MOTC Qatar2.3K visualizações
Ericsson ConsumerLab – Wearable technology and the internet of things por Ericsson
Ericsson ConsumerLab – Wearable technology and the internet of things Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson ConsumerLab – Wearable technology and the internet of things
Ericsson980 visualizações
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev... por itnewsafrica
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
The Challenge of Managing & Securing Data in the Mobile World. By Stuart Chev...
itnewsafrica535 visualizações
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor... por itnewsafrica
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
Realizing the Promise of the Mobile Workforce through a Mobile Device Platfor...
itnewsafrica894 visualizações
Connected Cars - Poster Child for the IoT Reality Check por Security Innovation
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
Security Innovation1.2K visualizações
Oies_IoT_week_lisbon_201506_wearablesfieldservice_final por Francisco Maroto
Oies_IoT_week_lisbon_201506_wearablesfieldservice_finalOies_IoT_week_lisbon_201506_wearablesfieldservice_final
Oies_IoT_week_lisbon_201506_wearablesfieldservice_final
Francisco Maroto796 visualizações
New Technology - our opportunities in the meeting industry por Mobilimeet
New Technology - our opportunities in the meeting industryNew Technology - our opportunities in the meeting industry
New Technology - our opportunities in the meeting industry
Mobilimeet 610 visualizações
Oies io t_week_lisbon_201506_social_iot_final por Francisco Maroto
Oies io t_week_lisbon_201506_social_iot_finalOies io t_week_lisbon_201506_social_iot_final
Oies io t_week_lisbon_201506_social_iot_final
Francisco Maroto523 visualizações
AI/Artificial Intelligent in Aviation Beyond Covid 19 por Assem mousa
AI/Artificial Intelligent in Aviation Beyond Covid 19AI/Artificial Intelligent in Aviation Beyond Covid 19
AI/Artificial Intelligent in Aviation Beyond Covid 19
Assem mousa145 visualizações
Freemium internet por Christoph Stork
Freemium internetFreemium internet
Freemium internet
Christoph Stork70 visualizações
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman por Rio Info
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin BreitmanRio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info 2015 - Projetos de Big Data no Setor Público - Karin Breitman
Rio Info419 visualizações
Investing in Drone Technology - VC Case Interview por Shifali Gupta
Investing in Drone Technology - VC Case InterviewInvesting in Drone Technology - VC Case Interview
Investing in Drone Technology - VC Case Interview
Shifali Gupta69 visualizações

Similar a Infographic under the hood of a connected car hack

Connected Cars - The Open Road for Hackers por
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersNick Rossmann
750 visualizações8 slides
Connected Cares: The Open Road For Hackers por
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
208 visualizações8 slides
connected-cars-the-open-road-for-hackers por
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersChristopher Porter
224 visualizações8 slides
Countering Cybersecurity Risk in Today's IoT World por
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
936 visualizações34 slides
Addressing Security in the Automotive Industry por
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
1.5K visualizações21 slides
Hackers are the new highway threat por
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threatHarman Innovation
2.7K visualizações21 slides

Similar a Infographic under the hood of a connected car hack(20)

Connected Cars - The Open Road for Hackers por Nick Rossmann
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for Hackers
Nick Rossmann750 visualizações
Connected Cares: The Open Road For Hackers por FireEye, Inc.
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
FireEye, Inc.208 visualizações
connected-cars-the-open-road-for-hackers por Christopher Porter
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackers
Christopher Porter224 visualizações
Countering Cybersecurity Risk in Today's IoT World por Brad Nicholas
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas936 visualizações
Addressing Security in the Automotive Industry por Sasken Technologies Ltd.
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
Sasken Technologies Ltd.1.5K visualizações
Hackers are the new highway threat por Harman Innovation
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
Harman Innovation2.7K visualizações
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx por saketkumar128143
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxSeminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
saketkumar1281436 visualizações
WHITE PAPER▶ Building Comprehensive Security Into Cars por Symantec
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
Symantec1.7K visualizações
hamaa2.pdf por Mahamad Jawhar
hamaa2.pdfhamaa2.pdf
hamaa2.pdf
Mahamad Jawhar27 visualizações
Cyber securityppt por Sachin Roy
Cyber securitypptCyber securityppt
Cyber securityppt
Sachin Roy142 visualizações
Forklift Impact Management in Real Time por Ted Jurca
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real Time
Ted Jurca49 visualizações
Forklift Fleet Management, SkidWeigh Technology por Ted Jurca
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh Technology
Ted Jurca13 visualizações
Patches Arrren't Just for Pirates por webnowires
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirates
webnowires42 visualizações
Forklift Impact Management, Defender system por Ted Jurca
Forklift Impact Management, Defender systemForklift Impact Management, Defender system
Forklift Impact Management, Defender system
Ted Jurca151 visualizações
Parking Automation System por SUSHANT DHANAVE
Parking Automation SystemParking Automation System
Parking Automation System
SUSHANT DHANAVE132 visualizações
Hacking your Connected Car: What you need to know NOW por Kapil Kanugo
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
Kapil Kanugo2.6K visualizações
Is cybersecurity protection of commercial vehicles harder? por Gilad Bandel
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?
Gilad Bandel101 visualizações
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that! por NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
NoNameCon214 visualizações
Secure Out Of Band Management - Comm Devices Inc. por Communication Devices Inc
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
Communication Devices Inc1.2K visualizações
From Driver Distraction to Driver Augmentation: Open Source in Cars por Alison Chaiken
From Driver Distraction to Driver Augmentation: Open Source in CarsFrom Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in Cars
Alison Chaiken569 visualizações

Mais de IBM Security

Automation: Embracing the Future of SecOps por
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
2K visualizações22 slides
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
914 visualizações39 slides
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
941 visualizações24 slides
Integrated Response with v32 of IBM Resilient por
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
1K visualizações21 slides
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
775 visualizações12 slides
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
742 visualizações18 slides

Mais de IBM Security(20)

Automation: Embracing the Future of SecOps por IBM Security
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security2K visualizações
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on... por IBM Security
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security914 visualizações
Bridging the Gap between Privacy and Security: Using Technology to Manage Com... por IBM Security
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
IBM Security941 visualizações
Integrated Response with v32 of IBM Resilient por IBM Security
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
IBM Security1K visualizações
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P... por IBM Security
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
IBM Security775 visualizações
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated... por IBM Security
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
IBM Security742 visualizações
Accelerating SOC Transformation with IBM Resilient and Carbon Black por IBM Security
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
IBM Security966 visualizações
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration por IBM Security
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
IBM Security1.3K visualizações
Are You Ready to Move Your IAM to the Cloud? por IBM Security
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
IBM Security2K visualizações
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence por IBM Security
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security3.2K visualizações
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec... por IBM Security
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security1.1K visualizações
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ... por IBM Security
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
IBM Security4.2K visualizações
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ... por IBM Security
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security3.6K visualizações
WannaCry Ransomware Attack: What to Do Now por IBM Security
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security6.9K visualizações
How to Improve Threat Detection & Simplify Security Operations por IBM Security
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
IBM Security1.9K visualizações
IBM QRadar UBA por IBM Security
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security5.7K visualizações
Mobile Vision 2020 por IBM Security
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
IBM Security1.5K visualizações
Retail Mobility, Productivity and Security por IBM Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security1.4K visualizações
Close the Loop on Incident Response por IBM Security
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K visualizações
Orchestrate Your Security Defenses; Protect Against Insider Threats por IBM Security
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security1.2K visualizações

Último

Caterpillar Cat 313B EXCAVATOR (Prefix BAS) Service Repair Manual (BAS00001 a... por
Caterpillar Cat 313B EXCAVATOR (Prefix BAS) Service Repair Manual (BAS00001 a...Caterpillar Cat 313B EXCAVATOR (Prefix BAS) Service Repair Manual (BAS00001 a...
Caterpillar Cat 313B EXCAVATOR (Prefix BAS) Service Repair Manual (BAS00001 a...dxem8295569
6 visualizações27 slides
CASE IH JX1070V Tractor Service Repair Manual Instant Download.pdf por
CASE IH JX1070V Tractor Service Repair Manual Instant Download.pdfCASE IH JX1070V Tractor Service Repair Manual Instant Download.pdf
CASE IH JX1070V Tractor Service Repair Manual Instant Download.pdfruan49549560
8 visualizações32 slides
Volvo EC25 Compact Excavator Service Repair Manual Instant Download.pdf por
Volvo EC25 Compact Excavator Service Repair Manual Instant Download.pdfVolvo EC25 Compact Excavator Service Repair Manual Instant Download.pdf
Volvo EC25 Compact Excavator Service Repair Manual Instant Download.pdffapanhe306271
52 visualizações20 slides
Audience profile (1).pptx por
Audience profile (1).pptxAudience profile (1).pptx
Audience profile (1).pptxMollyBrown86
7 visualizações3 slides
GER 41-K/NL por
GER 41-K/NLGER 41-K/NL
GER 41-K/NLJibbeHeetkamp
50 visualizações8 slides
Massey Ferguson MF 4690 COMBINE HYBRID CLASS 4 - TIER3 Parts Catalogue Manual... por
Massey Ferguson MF 4690 COMBINE HYBRID CLASS 4 - TIER3 Parts Catalogue Manual...Massey Ferguson MF 4690 COMBINE HYBRID CLASS 4 - TIER3 Parts Catalogue Manual...
Massey Ferguson MF 4690 COMBINE HYBRID CLASS 4 - TIER3 Parts Catalogue Manual...pwg56547003
6 visualizações23 slides

Último(20)

Caterpillar Cat 313B EXCAVATOR (Prefix BAS) Service Repair Manual (BAS00001 a... por dxem8295569
Caterpillar Cat 313B EXCAVATOR (Prefix BAS) Service Repair Manual (BAS00001 a...Caterpillar Cat 313B EXCAVATOR (Prefix BAS) Service Repair Manual (BAS00001 a...
Caterpillar Cat 313B EXCAVATOR (Prefix BAS) Service Repair Manual (BAS00001 a...
dxem82955696 visualizações
CASE IH JX1070V Tractor Service Repair Manual Instant Download.pdf por ruan49549560
CASE IH JX1070V Tractor Service Repair Manual Instant Download.pdfCASE IH JX1070V Tractor Service Repair Manual Instant Download.pdf
CASE IH JX1070V Tractor Service Repair Manual Instant Download.pdf
ruan495495608 visualizações
Volvo EC25 Compact Excavator Service Repair Manual Instant Download.pdf por fapanhe306271
Volvo EC25 Compact Excavator Service Repair Manual Instant Download.pdfVolvo EC25 Compact Excavator Service Repair Manual Instant Download.pdf
Volvo EC25 Compact Excavator Service Repair Manual Instant Download.pdf
fapanhe30627152 visualizações
Audience profile (1).pptx por MollyBrown86
Audience profile (1).pptxAudience profile (1).pptx
Audience profile (1).pptx
MollyBrown867 visualizações
GER 41-K/NL por JibbeHeetkamp
GER 41-K/NLGER 41-K/NL
GER 41-K/NL
JibbeHeetkamp50 visualizações
Massey Ferguson MF 4690 COMBINE HYBRID CLASS 4 - TIER3 Parts Catalogue Manual... por pwg56547003
Massey Ferguson MF 4690 COMBINE HYBRID CLASS 4 - TIER3 Parts Catalogue Manual...Massey Ferguson MF 4690 COMBINE HYBRID CLASS 4 - TIER3 Parts Catalogue Manual...
Massey Ferguson MF 4690 COMBINE HYBRID CLASS 4 - TIER3 Parts Catalogue Manual...
pwg565470036 visualizações
294196410-investigatoy-project-on-application-of-biotechnology.docx por maiyadeengupta94
294196410-investigatoy-project-on-application-of-biotechnology.docx294196410-investigatoy-project-on-application-of-biotechnology.docx
294196410-investigatoy-project-on-application-of-biotechnology.docx
maiyadeengupta949 visualizações
Caterpillar Cat 931B TRACK LOADER (Prefix 29Y) Service Repair Manual Instant ... por jiuliu14811471
Caterpillar Cat 931B TRACK LOADER (Prefix 29Y) Service Repair Manual Instant ...Caterpillar Cat 931B TRACK LOADER (Prefix 29Y) Service Repair Manual Instant ...
Caterpillar Cat 931B TRACK LOADER (Prefix 29Y) Service Repair Manual Instant ...
jiuliu1481147114 visualizações
John Deere 790 Compact Utility Tractor Service Repair Manual.pdf por dxem8295569
John Deere 790 Compact Utility Tractor Service Repair Manual.pdfJohn Deere 790 Compact Utility Tractor Service Repair Manual.pdf
John Deere 790 Compact Utility Tractor Service Repair Manual.pdf
dxem829556919 visualizações
Volvo A40F FS A40FFS Articulated Dump Truck Service Repair Manual Instant Dow... por qiuqiaoxi0
Volvo A40F FS A40FFS Articulated Dump Truck Service Repair Manual Instant Dow...Volvo A40F FS A40FFS Articulated Dump Truck Service Repair Manual Instant Dow...
Volvo A40F FS A40FFS Articulated Dump Truck Service Repair Manual Instant Dow...
qiuqiaoxi052 visualizações
Caterpillar Cat D5M TRACK-TYPE TRACTOR (Prefix 7LR) Service Repair Manual Ins... por ti76cui
Caterpillar Cat D5M TRACK-TYPE TRACTOR (Prefix 7LR) Service Repair Manual Ins...Caterpillar Cat D5M TRACK-TYPE TRACTOR (Prefix 7LR) Service Repair Manual Ins...
Caterpillar Cat D5M TRACK-TYPE TRACTOR (Prefix 7LR) Service Repair Manual Ins...
ti76cui7 visualizações
Volvo EC55 Compact Excavator Service Repair Manual Instant Download.pdf por zhenchun51
Volvo EC55 Compact Excavator Service Repair Manual Instant Download.pdfVolvo EC55 Compact Excavator Service Repair Manual Instant Download.pdf
Volvo EC55 Compact Excavator Service Repair Manual Instant Download.pdf
zhenchun5128 visualizações
Massey Ferguson MF 154 S TRACTOR Parts Catalogue Manual.pdf por nii776204
Massey Ferguson MF 154 S TRACTOR Parts Catalogue Manual.pdfMassey Ferguson MF 154 S TRACTOR Parts Catalogue Manual.pdf
Massey Ferguson MF 154 S TRACTOR Parts Catalogue Manual.pdf
nii7762046 visualizações
Volvo EC135B LC EC135BLC Excavator Service Repair Manual Instant Download.pdf por zhenchun51
Volvo EC135B LC EC135BLC Excavator Service Repair Manual Instant Download.pdfVolvo EC135B LC EC135BLC Excavator Service Repair Manual Instant Download.pdf
Volvo EC135B LC EC135BLC Excavator Service Repair Manual Instant Download.pdf
zhenchun5128 visualizações
Caterpillar Cat 930H Wheel Loader (Prefix DHC) Service Repair Manual Instant ... por jiuliu14811471
Caterpillar Cat 930H Wheel Loader (Prefix DHC) Service Repair Manual Instant ...Caterpillar Cat 930H Wheel Loader (Prefix DHC) Service Repair Manual Instant ...
Caterpillar Cat 930H Wheel Loader (Prefix DHC) Service Repair Manual Instant ...
jiuliu1481147116 visualizações
Jelly2 por Julia Kaye
Jelly2Jelly2
Jelly2
Julia Kaye13 visualizações
JOHN DEERE 5210 TRACTOR Service Repair Manual Instant Download (TM1716).pdf por qianxu35543635
JOHN DEERE 5210 TRACTOR Service Repair Manual Instant Download (TM1716).pdfJOHN DEERE 5210 TRACTOR Service Repair Manual Instant Download (TM1716).pdf
JOHN DEERE 5210 TRACTOR Service Repair Manual Instant Download (TM1716).pdf
qianxu3554363526 visualizações
Caterpillar Cat 330D Excavator (Prefix EDX) Service Repair Manual (EDX00001 a... por orrf0370383
Caterpillar Cat 330D Excavator (Prefix EDX) Service Repair Manual (EDX00001 a...Caterpillar Cat 330D Excavator (Prefix EDX) Service Repair Manual (EDX00001 a...
Caterpillar Cat 330D Excavator (Prefix EDX) Service Repair Manual (EDX00001 a...
orrf037038317 visualizações
Volvo ECR38 Compact Excavator Service Repair Manual Instant Download.pdf por dai20nao
Volvo ECR38 Compact Excavator Service Repair Manual Instant Download.pdfVolvo ECR38 Compact Excavator Service Repair Manual Instant Download.pdf
Volvo ECR38 Compact Excavator Service Repair Manual Instant Download.pdf
dai20nao29 visualizações
JOHN DEERE 316 LAWN GARDEN TRACTOR Service Repair Manual Instant Download (TM... por bu760639265959
JOHN DEERE 316 LAWN GARDEN TRACTOR Service Repair Manual Instant Download (TM...JOHN DEERE 316 LAWN GARDEN TRACTOR Service Repair Manual Instant Download (TM...
JOHN DEERE 316 LAWN GARDEN TRACTOR Service Repair Manual Instant Download (TM...
bu76063926595915 visualizações

Infographic under the hood of a connected car hack

  • 1. CONNECTED CAR HACK UNDER THE HOOD OF A new security vulnerabilites all drivers should be aware of. Today’s modern vehicles can contain over 100 processors, many of which control critical systems within the vehicle. Essentially a computer on wheels, the connected car presents MULTIPLE POINTS OF VULNERABILTY PRIMARY ATTACK POINTS CAR GETS HACKED devices which monitor speed, braking, and location. Located underneath the dashboard, the OBD2 port is a physical connection that is highly vulnerable. This diagnostic port is used to connect third-party OBD2 Port that expose vehicle data or functionality. Interfacing with vehicle systems are applications running on the driver’s personal mobile device. These applications may contain binary libraries MOBILE APPLICATIONS Infotainment Engine Locks Brakes System Airbags OBD2 Port EXTRACT BINARY CODE FROM DEVICE REVERSE-ENGINEER SOFTWARE TAMPER WITH BINARY CODE REDEPLOY MALICIOUS SOFTWARE High ThreatModerate ThreatLow Threat Mobile Applications 1 2 3 4 easily hacked if not protected. Typically the primary communication interface of a connected car, the infotainment system hosts high-value and sensitive applications that are INFOTAINMENT SYSTEM 1 & 2 3 4 KEEP SOFTWARE UPDATED: DON’T JAILBREAK YOUR CAR OR DEVICE: CHECK OUTLETS PERIODICALLY: ASK MANUFACTURER IF APPS ARE HARDENED: TO PREVENT IT WHAT YOU CAN DOHOW A CONNECTED HACKABILITY Check with your manufacturer and service provider to make sure you always have the In addition to making your car less secure, it may also void warranties. what you choose to plug in. Make sure you know what is plugged into any USB or OBD2 ports on your vehicle. Carefully consider latest version installed. to download. Verify that all mobile and pre-installed apps are hardened, in addition to any third-party apps you choose VEHICLE TO VEHICLE VEHICLE TOVEHICLE TO DEVICE NFC 802.11p 802.11p INFRASTRUCTURE What’s 802.11p? A new wireless standard that enables ITS or Intelligent Transportation Systems. Did you know? By 2020, it’s expected that 75% of cars shipped globally will have internet connectivity. Reverse-engineering tools (i.e. IDA pro) are fast, low in cost and easy-to-use.