The Fallacy of Hardware: Digital Lock-Picking Made Easy

As cyber threats are fundamentally about iteration – always evolving – improving and getting more potent – the weakness of using static hardware based cyber security solutions can’t be understated.

In a recent piece The Telegraph outline these issues in a clear way – did you know that the locks of any Volkswagen sold in the past 20 years can be easily breached?

When the technology was implemented hacks compromising the system weren’t readily available – today they are.

To ensure the safety of cars already in use the industry must find a solution for retrofitting – Trillium has that technology readily available.

The Fallacy of Hardware & The Urgent Need For Retrofitting

Big, Heavy and Moving: Trucks at risk too

The threats posed by hackers to cars are finally becoming widely known, with media outlets exposing the uncomfortable realities hidden by the industry for years – car hacks are both dangerous and easy to orchestrate  – this needs to be fixed.

An angle that is exposed far less is that of hacking commercial vehicles, which given their massive size, weight and sheer power has the potential to cause substantial damage. Add their long life span with inherently unsafe system and you are looking at a perfect setting for hackers to spread havoc.

A recent Wired piece outlines this problem in an elegant way, read the full story here.

David Uze on The New Jeep Hack: Connected Cars are still exposed

Trillium Incorporated’s CEO David Uze, was recently featured in a EE times piece, discussing the alarming consequences that failure to recognise the need that automotive security has can have – The industry needs to understand how big a threat hacks are, even when it is performed through a connecting to a  OBD-II Port

 “For example, when you bring your car to a repair shop and leave it for a little while, there is always a chance that an independent access could be made to your vehicle, with someone leaving a hard-to-spot, small device attached to the OBD-II port.”

A software based, layered approach is the best way to future proof cybersecurity and to divert hacks – regardless of point of entry.