Home Office to work with car manufacturers to defend against hackers

Car manufacturers yet to make leap into penetration testing says security lead

Car manufacturers may have to work more closely with the Home Office to defend against technology related vehicle theft, Theresa May hinted this morning.

In a speech on police reforms, the home secretary cited emerging technology as the key threat to consumers.

May said that the Home Office was aware that thieves can use sophisticated devices to "grab security coding" when the owner uses their key.

She said: "There have been reports that they could even use 'malware' to commandeer vehicle systems via satellites and issue remote demands to unlock doors, disable alarms and start car engines.

"Because we have this understanding, we can now work with industry to improve electronic resilience, include this kind of resilience in the vehicle's overall security ratings, and work out the extent to which the same threat applies to other physical assets such as building security systems."

May's remarks confirm that the car industry is in line for a security shake-up.

Tim Brown, head of research at Portcullis security company told ComputerworldUK: "May cites the example of car thefts in London, where a third no longer involves taking the owner's keys. When it comes to the motor industry fundamentally we're talking about an arms race, and car manufacturers, having had it their own way for a while with respect to cars, radios etc, are seeing the tables being turned.

"Some manufacturers, such as Tesla, have clearly heeded this call and are appointing 'ethical hackers' to drive this change, but more established players are yet to make that leap."

Security experts recently warned that automotive firms need to get to grips with software patching throughout the supply chain before connected cars reach critical mass.

Join the CSO newsletter!

Error: Please check your email address.

Tags securitybecacomputerworldpublic sectorhome officeIT Business

More about

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Margi Murphy

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place