Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Check Point: the popularity of electric vehicles, five suggestions to ensure safety

2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >

Share

Shulou(Shulou.com)11/24 Report--

Cyber attacks on electric vehicles surged 380 per cent, mainly by disrupting the normal operation of charging stations and the functions of the car itself, as well as stealing the data stored in it.

Remote vehicle hijacking, potential threat to charging stations and malicious disconnection are the three major network risks that endanger the safety of electric vehicles.

I wonder if you have noticed that recently this year, the number of electric cars around us tends to catch up with and surpass traditional cars. At the beginning of this year, a report from a third party showed that there were 14.6 million electric vehicles on the roads in China, accounting for half of the global total. In July this year, China accounted for four of the top 10 electric car brands in the world. Whether for reasons of innovation or environmental protection, more and more people choose to buy electric cars. However, the natural IT product properties of electric vehicles make it unable to avoid the security threats brought by lawbreakers, and they provide a new attack surface for cyber criminals. In fact, according to the Global Automotive Cyber Security report, threats to API surged by 380% by 2022, accounting for 12% of all security incidents.

As electric vehicles adopt more technological innovations and become increasingly interconnected, the risk of cyber attacks continues to increase. The driver's driving safety and the integrity of the data generated are at stake. CheckPoint believes that as cyber criminals continue to escalate their attacks, the security industry must act immediately and implement changes to ensure effective defense. To do this, users must understand the current risks associated with electric vehicles. In view of this, Check Point Software Technology Company would like to highlight three main entry points for electric vehicle cyber criminals to carry out illegal means:

1. Remote vehicle hijacking: imagine that when the user is holding the steering wheel of an electric car and enjoying driving calmly, he suddenly loses control of the vehicle, slows down, the steering wheel rotates out of control, or the engine accelerates suddenly without stepping on the accelerator. An invisible driver controls the vehicle, but there is nothing the user can do. Although this sounds like a fantasy plot in a movie, it may become a reality. As electric vehicles become more automated and interconnected, they become more vulnerable to cyber attacks. Cyber criminals with advanced knowledge can take advantage of loopholes in car electronics for remote control, which sounds like the plot in spy movies.

two。 Potential threat to charging stations: the threat to electric vehicle charging stations is an important aspect that affects network security, but it is often ignored, so it is very important to go to safe and reliable charging piles.

Manipulating the charging process: when users charge an electric vehicle, there may be a huge risk, as an attacker may try to manipulate the charging process: changing the charge, interrupting the charge, or even damaging the battery. this may greatly shorten the service life of the vehicle and increase maintenance costs.

Stealing personal data: smart charging stations collect information such as payment information, charging patterns and locations. If these charging stations do not take adequate security measures, it is possible for cyber criminals to gain access and commit identity theft or financial fraud.

Spreading malware: an attacker can hack into a charging station and take the opportunity to distribute malware to connected electric vehicles, thereby accessing the vehicle's electronic system.

Establish a malicious connection: connected charging stations are usually connected to the online payment system. Denial of service (DDoS) attacks can carry a large amount of malicious traffic, causing service disruption and inconvenience to users.

3. Maliciously destroy the connection: self-driving cars rely heavily on communication between themselves and the road infrastructure. Through these connections, they can share information about traffic, weather and other driving factors. However, this dependence also provides an opportunity for cyber attacks, which can have serious consequences. Because by manipulating data transmission, an attacker may induce the vehicle to make the wrong decision. Communication failures affect not only one car, but also other connected vehicles on the road, and can become a loophole used by cyber criminals to create chaos and traffic congestion.

Check Point believes that given the increasingly severe climate change situation and the reduced demand for oil, there is an urgent need to transition to greener modes of transport. Concerns about network security may become another obstacle to the future development of the electric vehicle market, and the automobile industry needs to be more proactive in dealing with safety challenges so that more users can feel at ease with the advantages of electric vehicles.

In order to ensure the safety of electric vehicles, users should pay attention to software updates, avoid connecting to public Wi-Fi, use strong passwords, and monitor the abnormal behavior of vehicles. The driver should also report the problem to the manufacturer in a timely manner. When using a charging station, be sure to verify the authenticity of the charging station and use a secure connection. Electric vehicle manufacturers should ensure the use of safety software, allow security protection to run through the software and hardware deployment process, and implement the principle of "minimum permissions" to restrict access to the software used.

The future of connected electric vehicles is promising, but it also poses huge safety challenges. To benefit fully from this new technology, we must effectively address existing and emerging challenges and ensure the security of software and hardware deployments.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

IT Information

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report