Getting under the hood of the Jeep hack, and other connected car vulnerabilities

26 November 2015
Report type: Research Note
Author(s): Godfrey Chua
Keywords: M2M, machine-to-machine, IoT, Internet of Things, IoT regulation, connected car, security, white hat hackers
Number of Pages: 5

The connected car represents one of the more high profile use cases in IoT today. For service providers (SPs), especially those in North America and Europe, it represents one of their fastest growing businesses. As the connected car continues to inflect however, a variety of security issues have emerged around it, most prominently illustrated by the recent hacking of a Jeep Cherokee vehicle. These issues span a wide range of complexity and implications for the car owner. They have also received significant media attention in recent months.

This Research Note examines the challenges of securing the connected car and the near term implications this may have on regulation, consumer adoption and the industry itself.

Keywords: M2M, machine-to-machine, IoT, Internet of Things, IoT regulation, connected car, security, white hat hackers

Companies mentioned in this report: BMW, Fiat Chrysler Automobiles (FCA), General Motors (GM), Jeep, OnStar

Download PDF > Log in or subscribe to this Research Stream, please see our Advisory Service.
quick links >
Find out more:

If your company has an account but you do not have a password, please contact us.

If your company does not have an account, please find out more about Machina Research's portfolio of content and services and how you can get access.

Please log in to continue:
Login >

If you have forgotten your password, please click here to reset it.

X