Why software security in connected cars starts with software developers

(c)iStock.com/Jirsak

Compromising the ‘Internet of Things’ seems to be one of the most ‘fashionable’ areas among today’s hackers, including connected cars. Just consider the extensive coverage given to the remote takeover of a Jeep Cherokee by security researchers Charlie Miller and Chris Valasek, which took place via a security vulnerability in the...

By Mark Warren, 26 November 2015, 0 comments. Categories: Best practice, Security.