Cars aren’t the only devices in the Internet of Things that are capable of being hacked, of course. Critical medical equipment, mobile devices, printers and even coffee machines can be easy prey for those intent on exploiting security vulnerabilities.
Connected devices help organisations offer new services, reshape experiences and enter new markets. However with these opportunities come risks that the data, devices and systems needed for new ways of doing business, will be compromised with new and unforeseen consequences. Devices have software and architecture vulnerabilities that could let malicious actors hijack and control them, with potentially dangerous consequences. Many organisations are not fully aware of how many connected devices they have let alone their security vulnerabilities and potential impact on business operations.
It is also important to be aware that as new network and communications infrastructures are created to support innovation in the Internet of Things, a vast number of different wireless technologies will be used to connect devices to the Internet. Irrespective of the approach an organisation takes to the deployment of Internet of Things, a robust, secure wireless network is an essential component, as is wireless connectivity management, controllers to manage traffic and a secure system to integrate wireless and wired networks.
So how can organisations maximise the potential of the Internet of Things securely? To find out more, click here to read our full In View on the Internet of Things.
A Chinese security team successfully hacked a Tesla Model S, and demonstrated several security vulnerabilities. And yes, they showed they could control the car remotely, whether the car was parked or in motion. The hack required a couple of conditions, of course. The driver would have to connect to a malicious WiFi hotspot, and then use the web browser. This is how the hackers were able to gain access.