You must have an Automotive Newssubscription to view the digital edition
Click here to subscribe
Security professionals lament that industries tend to underappreciate the risks they face until a major hack or breach jolts them awake. On July 1, a robotics supplier received just such a jolt.
Sign up to receive our newsletter each Thursday covering the intersection of transportation and technology.
View the entire issue in your browser.
We set out to make this issue of Shift all about cybersecurity, but we ended up writing mostly about hackers.
Like a teacher walking around school with a "kick me" sign on his back, Trillium Secure CEO David Uze traveled across the country asking for trouble.
Hackers managed to copy a Tesla Model S key in two seconds with just $600 of equipment, researchers have said.
They call it the 8200 Unit, an elite part of the Israeli Defense Force that is becoming the training ground for some of the hottest cybersecurity companies in the world.
Last year's eighth installment of "The Fast and the Furious" franchise, "The Fate of the Furious," preyed upon a real-world fear: In one sequence, the superhacker commandeers a fleet of New York City cars, using them as her...
As cybersecurity becomes an ever-more pressing concern for automakers, the auto industry is embracing bug bounty programs.
Sometimes the tricky world of white-hat hacking gets mixed up in the minefield that is global politics, and it can get messy.
A study by the IBM Institute for Business Value examined the security of Industrial Internet of Things technologies.
Lawyers have been advising dealership owners to keep quiet if they realize they've faced a cybersecurity problem.
Get 24/7 access to in-depth, authoritative coverage of the auto industry from a global team of reporters and editors covering the news that's vital to your business.
Sign up today to get the best of Automotive News delivered straight to your email inbox, free of charge. Choose your news – we'll deliver.
Entire contents © Crain Communications, Inc.
Use of editorial content without permission is strictly prohibited. All Rights Reserved.