In recent years, the automotive sector has undergone several rapid changes, including connected and autonomous vehicles, advanced driver assistance systems, and smart transportation. Although they have increased driver comfort and […]

In recent years, the automotive sector has undergone several rapid changes, including connected and autonomous vehicles, advanced driver assistance systems, and smart transportation. Although they have increased driver comfort and […]
China’s first-ever automotive data security regulation is slated to go into effect on 1 October. The provision, which primarily aims to regulate automotive data processing in the country, joins a […]
As modern vehicles grow increasingly connected, they are becoming a boon to cyber criminals in the process. According to the AV-TEST Institute, cyber attacks targeting vehicles increased to about 1.1 […]
A research team from The Ohio State Center for Automotive Research (CAR) is constructing a dedicated platform for cyber security testing in an autonomous vehicle (AV). The Mobility Cyber Range […]
Automakers are increasingly jam packing modern vehicles with connected systems that can present serious cyber security risks. According to a recent report from the New York Times, automakers and electronic […]
A new report from the European Union Agency for Cybersecurity (ENISA) and Joint Research Center (JRC) is illuminating the cyber security issues related to artificial intelligence (AI) systems in autonomous […]
As vehicles become more connected with high-tech computer systems and software, there’s increasing concern about cyber security. Many governments are beginning to issue automotive cyber security best practices and regulations. […]
Currently, 200 million digitally “connected vehicles” are traversing the world’s roadways, according to a recent white paper from the 5G Automotive Association (5GAA). By 2024, real-time traffic updates will be […]
Today, it’s relatively easy for cyber criminals to hack into connected vehicles. The reason being that they only need to exploit a single vulnerability within an autonomous car to gain […]