pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in the future.

Unfortunately, they are not without risks. One of the biggest concerns is that they can be targeted by hackers. This used to be a concern that only showed up in science fiction movies, but recent reports show it is a reality.

Self-Driving Cars Are Vulnerable to Hackers

As vehicles become technological devices on wheels, hackers can be very good allies of manufacturers to detect vulnerabilities. The best example is Tesla, which has relied on them on a recurring basis to expose security flaws in software.

But they can also become an enemy of the connected and autonomous car. In this scenario, the US state agency NHTSA has published a manual of good practices to be followed by automakers to prevent hacks.

It has been well known that many cars can be targeted by hackers. Half a million Chrysler cars, Jeep Cherokees, Chrysler 200s and Dodge Rams, can be hacked and remotely controlled through a critical vulnerability in the Uconnect service. The vulnerability has been patched and the automaker recommends immediate system updates. Unfortunately, self-driving cars are even more at risk.

The smart car is an advance the automotive industry is investing heavily in. With technology as a central point, its present and future depends on developments by the major technology companies or by the car companies themselves to provide solutions for communications, information, entertainment and general control of all kinds of parameters.

The most advanced will be the self-driving car. A large part of the automobile industry is working on technologies that will allow cars to circulate without human intervention, although the approval of regulations that will allow them is currently one of the major obstacles to their extension.

And security, as shown in the case of some Chrysler car models, with a zero-day vulnerability discovered by a group of researchers that makes it possible to take control of vehicles via the Internet. The concerns include the following:

  • Vulnerability of car sensors. One of the agency’s main concerns is sensor tampering. The report highlights Lidar or radar interference, GPS spoofing or modification of traffic signs and speed limits to fool the system by attacking the software.
  • OTA updates. Wireless or ‘Over The Air’ updates are already the norm in the automotive industry, but also a gateway to hackers.
  • Accessories and parts.  The best practices guide reminds aftermarket manufacturers that while their devices may not appear to be able to affect security systems, they should be designed with such considerations in mind and should also undergo the same type of security verification as the vehicles themselves.

Seemingly harmless devices, such as USB adapters or keys that transfer data or telematics collection devices (such as those used by some insurance companies to reward good drivers), could be used as proxies for other attacks.

Today’s technology allows anyone without much computer knowledge to breach a vehicle’s system by simply changing the code in software updates.

An example of this can be found in the CAN Bus (Controller Area Network) system, which is responsible for sending signals that will control everything from the infotainment system to the brakes and steering, which would be at the mercy of the hacker.

Also with a basic kit purchased on the Internet they can manipulate the remote controls that open and close the cars.

Filed Under: Articles

Latest Articles

Object Oriented Programming 8

And that's it for our introduction to using Object Oriented (OO) design techniques. We've looked at inheritance, multiple inheritance and polymorphism, and you can see how designing the class tree structure in this way forces the designer to fully understand the problem. It also defines very … [Read More...]

7 Fun Science Activities for Children

Getting a head start on creating the scientists of tomorrow should happen at a young age. However, even if your kid doesn't become an astrophysicist, understanding science is a valuable life skill to possess. For parents, engaging in science activities is a fun and constructive way for you to spend … [Read More...]

Why VoIP Is Better than Plain Old Telephone Systems

If you have been following the blog lately, you know we have been talking about VoIP a bit lately. We have talked about if you should cut your landline and convert to VoIP. But, today we will pitch our hat into the ring and extoll why we think that VoIP is really the way to go for business these … [Read More...]

Everything You Need to Know About Sourcing Circuit Boards From U.S. Suppliers

In This Article This article includes: Why Source PCBs From the United States?How to Get a Quote From a U.S.-Based PCB ManufacturerThe Top U.S. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Pentium 4 Memory

Dual-channel memory operation is dependent on a number of conditions being met, Intel specifying that motherboards should default to single-channel … [Read More...]

Differences Between Spyware, Malware and Others

There are countless ways that your computer can be infected by harmful elements but the vast majority of them come down to the four usual … [Read More...]

One-Click Operation of VHS Video to DVD Transfer Using ADVC-55

Once you have installed the ADVC-55 software, double-clicking the Let's CONVERT program icon causes a mini operating screen to appear above the … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors