{"id":77715,"date":"2023-03-02T16:11:25","date_gmt":"2023-03-02T14:11:25","guid":{"rendered":"https:\/\/blog.richardvanhooijdonk.com\/?p=77715"},"modified":"2023-03-02T16:49:51","modified_gmt":"2023-03-02T14:49:51","slug":"how-will-we-protect-tomorrows-connected-cars-from-cyberattacks","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/","title":{"rendered":"How will we protect tomorrow\u2019s connected cars from cyberattacks?"},"content":{"rendered":"\n<ul class=\"bold-list\">\n<li>So, how big is the (potential) problem?<\/li>\n\n\n\n<li>The importance of cybersecurity by design<\/li>\n\n\n\n<li>Today\u2019s cyberthreats \u2014 tomorrow\u2019s new business opportunities?<\/li>\n<\/ul>\n\n\n\n<p>Internet-connected vehicles, many of which already have (semi-)autonomous features, will completely change transportation as we know it. They are anticipated to prevent many of our road accidents in the future, reduce pollution and congestion, and lower the need for parking spaces. To enable connected vehicles to accomplish all of this, they will need to be equipped with sensor technology and wireless interfaces that connect them to the internet, infrastructure, external devices and systems, and, of course, other road users. And while this connectivity will introduce incredible functionality and offer many benefits, vehicles that are this interconnected, complex, and increasingly programmable will inadvertently also introduce more attack surfaces that can be exploited, exposing us to a great number of privacy and (cyber)security risks. The good news is that car manufacturers are increasingly incorporating hardware, as well as software, to protect self-driving vehicles from cyberattacks. In fact, <a href=\"https:\/\/www.globenewswire.com\/news-release\/2022\/08\/09\/2494574\/0\/en\/Automotive-Cybersecurity-Market-worth-5-3-billion-by-2026-Exclusive-Report-by-MarketsandMarkets.html\">according<\/a> to MarketsandMarkets, the automotive cybersecurity market is projected to grow from $2.0 billion in 2021 to $5.3 billion by 2026, at a CAGR of 21.3 per cent. The bad news is that cybercriminals are keeping pace and developing more and more advanced hacking capabilities. So, how will we protect tomorrow\u2019s cars from cyberattacks?<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center quote-stat is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">\u201cAnd if you consider the fact that more and more people will be relying on connected car technologies in the years to come \u2014 not only for efficiency and safety but for infotainment as well \u2014 and that every car that\u2019s connected to the Internet of Things will produce around <strong>30<\/strong> terabytes of data on a daily basis\u2026 well, then it\u2019s not difficult to see that (cyber) protecting these vehicles will become paramount\u201d.<\/p>\n<cite><em>Richard van Hooijdonk, trendwatcher and futurist<\/em><br><\/cite><\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-alpha-channel-opacity has-white-background-color has-background\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">So, how big is the (potential) problem?<\/h2>\n\n\n\n<p>According to the <em>Connected Car Overview, 2020-2030<\/em> report, the connected car space will <a href=\"https:\/\/transformainsights.com\/research\/reports\/connected-car-overview-2020-2030\">grow<\/a> to 2.5 billion \u2018connections\u2019 by 2030 \u2014 which is 1.8 billion connected vehicles plus 0.7 billion aftermarket devices. More and more channels will start intertwining; think connected devices, connected infrastructure, cloud storage, and so on. And as cars are increasingly resembling computers on wheels, containing multiple chips with millions of lines of code each that control every conceivable action and reaction \u2014 from braking systems to temperature and more \u2014 it becomes clear that securing these vehicles is a complex challenge.&nbsp;<\/p>\n\n\n\n<p>Futurist and trendwatcher Richard van Hooijdonk says: \u201cAnd if you consider the fact that more and more people will be relying on connected car technologies in the years to come, not only for efficiency and safety but infotainment as well, and that every car that\u2019s connected to the Internet of Things will produce around 30 terabytes of data on a daily basis\u2026 well, then it\u2019s not difficult to see that (cyber) protecting these vehicles will become paramount, not only for the safety of the passengers but also to actually enable the potential benefits of these technologies to materialise\u201d. Cars are increasingly becoming part of the smart device and digital services ecosystem, and in the future, our \u2018personalised cars\u2019 will even become part of our digital identities.<\/p>\n\n\n\n<p>So, let\u2019s delve into the various rather creepy things connected cars of the future will be able to do \u2014 and the threats that could jeopardise the safety of the people in (and around) them. Being really just like any other smart device, connected cars with their embedded sensors, microchips, microphones, and cameras will collect all kinds of information, such as your location, how much fuel you use, billing information, whether you wear your seatbelt, how fast you drive, how aggressively you brake, the shops, restaurants, and other establishments\/people\/institutions you visit, what music you listen to, the number of telephone calls you make and to whom, and your activity on social media. Sure, car manufacturers might state that all of this information will merely enable them to improve their products (and insurers might claim that this information helps them determine the cause of accidents). And sure, they might promise never to share your information with others without your consent. But stop to think for a moment about how valuable this data is to others, such as (other) companies, law enforcement, and government agencies.<\/p>\n\n\n\n<p>Then there\u2019s the issue of potentially <a href=\"https:\/\/www.wirelesscar.com\/automotive-cybersecurity-threats-and-risk-mitigation\/\">infected<\/a> devices that are connected to your car, such as your smartphone, entertainment systems, key fobs, telematics, third-party apps, and so on, that could spread this infection to the software systems of the car. And we can only imagine what could transpire should cybercriminals manage to get control over your car. They could, for instance, activate the vehicle\u2019s microphone and listen to your conversations, disable the car\u2019s security system, or disable your brakes and cause a crash. We\u2019ve all read about the 1.4 million vehicles that Chrysler had to recall after hackers <a href=\"https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/\">managed<\/a> to hack a Jeep and took over the car\u2019s dashboard, brakes, steering, and transmission in 2014. And in 2021, from his home in Germany, a 19-year-old managed to break into dozens of electric cars in 13 countries, controlling the cars\u2019 lights, locks, and temperature. He also managed to discern owners\u2019 email addresses and their cars\u2019 locations. From these examples and various more recent breaches, it\u2019s not hard to see how, going forward, ransomware could be used against insufficiently secured vehicles, potentially holding entire corporate fleets of connected cars \u2014 or those of a certain carmaker \u2014 hostage until the hackers are paid. Cybercriminals or state actors could even hijack a fleet of self-driving vehicles and transform them into weapons on wheels. Infected or hacked vehicles could also pose serious risks to the environment in which they operate, such as the cell towers, satellites, and servers they communicate with, but also infrastructure, such as vehicle charging stations, sensors embedded in roads, bridges, or buildings, or smart traffic management systems.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"563\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_1shutterstock_1793836633_1.jpg\" alt=\"\" class=\"wp-image-77722\" srcset=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_1shutterstock_1793836633_1.jpg 1000w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_1shutterstock_1793836633_1-300x169.jpg 300w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_1shutterstock_1793836633_1-768x432.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>Even though the current risk of your car being hacked is still quite low, in the near future, all vehicles will become smart devices, which will make them sought-after treasure troves containing highly sensitive information. Connected cars will require significantly advanced levels of protection against all kinds of threats, and corporations will need to provide their self-driving fleets with the same type of security they use to protect their office networks, such as intrusion detection systems, firewalls, and patch management solutions. And at the point of manufacture, carmakers will need to focus on security by design, zero-trust architecture, encryption, and so on.\u00a0<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center quote-stat is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-text-align-center\">\u201cTo ensure that the foundation of a vehicle\u2019s critical security system is safe, vehicles must be secure by design: security must be embedded within every aspect of the vehicle. There will always be new threats, but a car should be capable of stopping cyberattacks through standalone solutions that do not require any human intervention\u201d.<\/p>\n<cite><em>Moshe Shlisel, CEO GuardKnox<\/em><\/cite><\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-alpha-channel-opacity has-white-background-color has-background\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The importance of cybersecurity by design<\/h2>\n\n\n\n<p>With billions already having been pumped into connected cars and related technologies, it\u2019s clear that we\u2019re firmly on the road to ever-increasing connected driving, leaving the pre-internet era far behind us. All of the elements that make up the connected automotive ecosystem, including car manufacturers, regulatory bodies, federal lawmakers, cybersecurity experts, security suppliers, and so on, will have to collaborate to enhance existing processes and improve existing security measures to ensure that the vehicles of the future will be adequately protected from ransomware, malware, botnets, DDoS, and various other security risks. But until governments impose rigorous cyber standards for connected vehicles, drivers, passengers, and other road users will remain at serious risk.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Hacking group demonstrates Teslas can be unlocked remotely by relaying bluetooth from phone\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/5mdU4ksOc2w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>The most important first step is security by design, which means that security should be embedded during the design phase for each aspect of the vehicle \u2014 from GPS and infotainment to telematics and more \u2014 before the car is manufactured, and not as an afterthought. Millions of connected cars are already on the road with no cyber protection whatsoever, which is a recipe for disaster. Moshe Shlisel, CEO at GuardKnox, a company that offers automotive manufacturers cybersecurity solutions, <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/04\/15\/protect-connected-cars\/\">explains<\/a>: \u201cVehicles should not need constant human interaction with the cybersecurity aspects of a vehicle in order to prevent cyberattacks. To ensure that the foundation of a vehicle\u2019s critical security system is safe, vehicles must be secure by design: security must be embedded within every aspect of the vehicle. There will always be new threats, but a car should be capable of stopping cyberattacks through standalone solutions that do not require any human intervention, and which are not learning mechanisms but rather deterministic\u201d. All of these millions of connected, semi-autonomous cars already on the road will now need to be retrofitted with aftermarket cybersecurity solutions to protect them.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-alpha-channel-opacity has-white-background-color has-background\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Today\u2019s cyberthreats \u2014 tomorrow\u2019s new business opportunities?<\/h2>\n\n\n\n<p>These automotive cybersecurity threats, which are expected to increase in frequency as well as in scale and severity, will also lead to new business opportunities for car manufacturers, who will increasingly become service providers as well, as making and selling the hardware alone will no longer be sufficient. <a href=\"https:\/\/www.alliedmarketresearch.com\/automotive-cyber-security-market-A08901\">According<\/a> to Allied Market Research, a significant number of businesses will be moving into the adaptive security market in the years ahead. Adaptive security involves the analysis of behaviours and events that can help smart systems prevent attacks before they occur. Leveraging analytics technology, adaptive security protects against targeted, as well as opportunistic attacks, insider threats, and more. The specialised security software can be used to continuously analyse potential threats, calculate risks, and provide security solutions that can be scaled up or down, depending on the situation at hand. And as automotive cybersecurity needs will likely encompass the entire mobility ecosystem, business opportunities abound in various other related areas and industries as well. We\u2019re not only talking about the protection of the actual vehicles, but also their charging stations, the devices they are connected to, and the data streams between these vehicles and external devices, smart city elements, the cloud, and many other interfaces.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-alpha-channel-opacity has-white-background-color has-background\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">In closing<\/h2>\n\n\n\n<p>With cars becoming increasingly connected to everything \u2014 including other vehicles, parking metres, and traffic management systems \u2014 and driver preferences and requirements rapidly evolving, we\u2019re seeing the connected car industry continuously adapting. Connected vehicles are, in a way, not very different from smartphones and other smart IoT devices: they are connected to the internet and communicate with other smart equipment and systems, and in doing so, they transmit and receive data. And while all of the latest technologies and the data needed for them, such as advanced driver assistance, increased personalisation, and ubiquitous connectedness, are improving comfort and road safety, they also expose drivers, other road users, and the connected ecosystem of smart devices and systems to cyberattacks. This not only necessitates the need for the implementation of rigorous cyber standards for connected vehicles but the implementation of cybersecurity by design as well. The need for solutions is expected to drive the growth of the worldwide automotive cybersecurity market in the years to come and provide opportunities for businesses in the connected automotive sector to provide retrofitted aftermarket cybersecurity solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet-connected vehicles, many of which already have (semi-)autonomous features, will completely change transportation as we know it. They are anticipated to prevent many of our road accidents in the future, reduce pollution and congestion, and lower the need for parking spaces. To enable connected vehicles to accomplish all of this, they will need to be [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":77716,"parent":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[],"article-type":[],"trends":[5488],"class_list":["post-77715","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","trends-autonomous-vehicles-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How will we protect tomorrow\u2019s connected cars from cyberattacks?<\/title>\n<meta name=\"description\" content=\"Automotive connectivity will introduce incredible functionality, but cars that are this interconnected will also introduce more attack surfaces that can be exploited.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How will we protect tomorrow\u2019s connected cars from cyberattacks?\" \/>\n<meta property=\"og:description\" content=\"Automotive connectivity will introduce incredible functionality, but cars that are this interconnected will also introduce more attack surfaces that can be exploited.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-02T14:11:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-02T14:49:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_shutterstock_1350383198.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\"},\"headline\":\"How will we protect tomorrow\u2019s connected cars from cyberattacks?\",\"datePublished\":\"2023-03-02T14:11:25+00:00\",\"dateModified\":\"2023-03-02T14:49:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/\"},\"wordCount\":1851,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/rsz_shutterstock_1350383198.jpg\",\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/\",\"name\":\"How will we protect tomorrow\u2019s connected cars from cyberattacks?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/rsz_shutterstock_1350383198.jpg\",\"datePublished\":\"2023-03-02T14:11:25+00:00\",\"dateModified\":\"2023-03-02T14:49:51+00:00\",\"description\":\"Automotive connectivity will introduce incredible functionality, but cars that are this interconnected will also introduce more attack surfaces that can be exploited.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/rsz_shutterstock_1350383198.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/rsz_shutterstock_1350383198.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How will we protect tomorrow\u2019s connected cars from cyberattacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How will we protect tomorrow\u2019s connected cars from cyberattacks?","description":"Automotive connectivity will introduce incredible functionality, but cars that are this interconnected will also introduce more attack surfaces that can be exploited.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"How will we protect tomorrow\u2019s connected cars from cyberattacks?","og_description":"Automotive connectivity will introduce incredible functionality, but cars that are this interconnected will also introduce more attack surfaces that can be exploited.","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2023-03-02T14:11:25+00:00","article_modified_time":"2023-03-02T14:49:51+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_shutterstock_1350383198.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37"},"headline":"How will we protect tomorrow\u2019s connected cars from cyberattacks?","datePublished":"2023-03-02T14:11:25+00:00","dateModified":"2023-03-02T14:49:51+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/"},"wordCount":1851,"commentCount":0,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_shutterstock_1350383198.jpg","articleSection":["Cybercrime"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/","name":"How will we protect tomorrow\u2019s connected cars from cyberattacks?","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_shutterstock_1350383198.jpg","datePublished":"2023-03-02T14:11:25+00:00","dateModified":"2023-03-02T14:49:51+00:00","description":"Automotive connectivity will introduce incredible functionality, but cars that are this interconnected will also introduce more attack surfaces that can be exploited.","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_shutterstock_1350383198.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2023\/03\/rsz_shutterstock_1350383198.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-will-we-protect-tomorrows-connected-cars-from-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"How will we protect tomorrow\u2019s connected cars from cyberattacks?"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/77715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=77715"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/77715\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/77716"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=77715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=77715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=77715"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=77715"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=77715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}