Search Results for: automotive

At the 2016 Black Hat security conference, automotive cybersecurity researchers Charlie Miller and Chris Valasek demonstrated new ways to hack the 2014 Jeep Cherokee they compromised at the conference the year before. They were able to stop the vehicle from any speed in seconds, manipulate the steering so as to crash the car, and take control ...
Read Blog
The focus on the security of automobiles and the transportation sector as a whole (planes, trains, etc.) is steadily increasing. In 2015 we saw major vulnerabilities in automotive technology, in which researchers were able to remotely take control of vehicles, including the acceleration, braking, and steering. There were also reports of weaknesses in commercial airlines that could ...
Read Blog
The time has come to say goodbye to Barcelona as we wrap up our time here at Mobile World Congress (MWC). Although it’s hard to believe that the show is already over, MWC 2019 managed to deliver a slew of showstoppers that captured our attention. Here are some of my main takeaways from the event: ...
Read Blog
The sun has finally set on The International Consumer Electronics Show (CES) in Las Vegas. Every year, practically everyone in the consumer electronics industry comes from all over to show off the latest and greatest cutting-edge innovations in technology. From flying taxis, self-driving suitcases, and robots that will fold your laundry, CES 2019 did not ...
Read Blog
The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation. Auto sales are expected to triple between 2017 and 2022, to US$155.9 billion from $52.5 billion, according to PwC France. ...
Read Blog
Sometime in the distant past, that thing in your driveway was a car.  However, the “connected car is already the third-fastest growing technological device after phones and tablets.”  The days when a Haynes manual, a tool kit, and a free afternoon/week to work on the car are fast becoming a distant memory. Our connected cars ...
Read Blog
Threats against the Industries Today’s devices are becoming more internet-connected as we speak. As our world becomes further intertwined with technology, new doors open directly into our lives for potential threats. Hackers are quickly advancing with their attacks, making it detrimental for end users if security is not provided. Consumers within the retail, medical, industrial ...
Read Blog
Mobile World Congress (MWC) provides yet another opportunity for technology giants to flex their muscles and whip the industry into a frenzy. Even more-so than last year, mobile is a reflection of the Internet of Things (IoT) and the hyper-connected world we find ourselves living in. Following in the footsteps of CES, I expect to ...
Read Blog
Despite headlines, hype, and hysteria, US government rightly chooses cybersecurity guidance over regulation. The Obama administration today unveiled its long-awaited safety policy for self-driving or automated vehicles (AVs). Despite the recent tragic death of a passenger travelling in a Tesla-built AV, and persistent discussions of spectacular cyber-sabotage scenarios, the government chose a wise, sober course ...
Read Blog
Fifth-generation networking (5G) holds the potential for a massive immersion of technology into the lives of people and businesses. It is an evolution of technology that could allow enough bandwidth for 50 billion smart devices, driving toward a world in which everything that computes will be connected. Such transformative technology opens great opportunities, but also presents new ...
Read Blog