Why connected car renters should delete iPhone/smartphone, Bluetooth, GPS info
The FTC warns car renters who connect their iPhone or Android smartphone to rental cars to be careful and delete their data or use a
The FTC warns car renters who connect their iPhone or Android smartphone to rental cars to be careful and delete their data or use a
NVIDIA announced Parker, its newest mobile processor that will power the next generation of autonomous vehicles. Parker delivers class-leading performance and energy efficiency, while supporting
If you are automaker, whatever you do, don’t sell a car to Charlie Miller or Chris Valasek. Owners of a Jeep Cherokee, they like to
Failure to prevent a vehicle hack could be devastating to automotive brands and the bottom line according to the 2016 KPMG Consumer Loss Barometer study.
After being the first company to be remotely hacked while on the road, last July, Fiat Chrysler Automobiles is taking a a proactive approach offering
The European version of AAA found some problems with keyless entry and smartphone apps on popular model vehicles sold in the United States and Europe.
NHSTA and FBI offer connected car owners advice to prevent hacking. Suggestions include updating software, checking for recall notices, avoiding malicious downloads, connections and contacting
As a LEAF owner, I’m not worried about the recent hack of the remote apps for Nissan LEAFs because of what happened to my LEAF
The U.S. Department of Transportation, NHTSA and automakers have agreed to work together for cybersecurity, safety, warning data and proactive recalls. Companies that agreed to
At the Connected Car Expo during the LA Auto Show, security cryptoprahy provider whiteCryption, announced that its line of Cryptanium security will be deployed my
At Black Hat Europe, a speaker will show to trick an self-driving car into stopping for things that don’t exist. Jonathan Petit will show remote
Frost & Sullivan’s recent whitepaper, Cybersecurity: Automakers Remain Passive as Government Takes Action, analyzes cyber security challenges, identifies solutions, and outlines a best-practices approach. Historically,