Page 26 - Cyber Defense eMagazine - September 2017
P. 26
Closing
The vehicle has a great amount of respect for the vehicle. The owner and user do not want the
vehicle to be vandalized and stolen. WHen the owner purchased the vehicle they bargained for,
the person was not expecting the connectivity and application to be insecure and open to a form
of vandalism. The level of insecurity allows for the vehicle to be attacked from many points. This
could have been remediated with better planning or coding.
Resources
Greenberg, A. (2017, February 16). Android phone hacks could unlock millions of cars.
Retrieved from https://www.wired.com/2017/02/hacked-android-phones-unlock-millions-cars/
Kuzin, M., & Chebyshev, V. (2017, February 16). Mobile apps and stealing a connected car.
Retrieved from https://securelist.com/analysis/publications/77576/mobile-apps-and-stealing-a-
connected-car
Zorz, Z. (2017, February 17). Insecure car-controllering android apps are a boon for car thieves.
Retrieved from https://www.helpnetsecurity.com/2017/02/17/insecure-car-controlling-android-
aps/
About the Author
Charles Parker, II began coding in the 1980’s. Presently CP is an
Cybersecurity Lab Engineer at a Tier One supplier to the
automobile industry.
CP is presently completing the PhD (Information Assurance and
Security) with completing the dissertation. CP’s interests include
cryptography, SCADA, and securing communication channels.
He has presented at regional InfoSec conferences. Charles
Parker, II can be reached online at [email protected]
and InfoSecPirate (Twitter).
26 Cyber Defense eMagazine – September 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide.