Export Compliance Daily is a Warren News publication.

BT Launches ‘Ethical Hacking Service’ for Connected Cars

British Telecom launched what it’s calling an “ethical hacking service” to test the exposure of connected cars “and help all market players develop security solutions,” the company said in a Monday announcement. Connected cars rely on a variety of connectivity…

Sign up for a free preview to unlock the rest of this article

Export Compliance Daily combines U.S. export control news, foreign border import regulation and policy developments into a single daily information service that reliably informs its trade professional readers about important current issues affecting their operations.

options, including WiFi, 3G or 4G mobile data links, Bluetooth and other wireless technologies, BT said. “These provide a range of new on-board features and value-added services, such as predictive systems to bypass traffic jams, reduce carbon emissions, improve safety and vehicle performance. Vehicles are also becoming more connected through electronic systems like navigation, infotainment, and safety monitoring tools.” The proliferation of these services also “raises concerns about the ability of hackers to gain access and control to the essential functions and features of those vehicles and for others to use information on drivers' habits for commercial purposes without the drivers' knowledge or consent,” it said. BT is extending its security expertise to “advise vehicle manufacturers, insurance companies and other players in the automotive industry, with the aim of identifying and fixing vulnerabilities before the keys of a new vehicle are handed to a proud owner,” it said. The program it’s launching involves a range of tests targeted at the “attack surfaces” of the vehicle, BT said. “These cover interfaces that are accessible inside the car, such as Bluetooth links, USB ports, or the DVD drive, as well as external connections such as links to mobile networks or power plugs. BT looks at the end-to-end security by testing and verifying all the systems that interact with the connected vehicle. The ultimate objective is to identify vulnerabilities that would allow unauthorized alteration of configuration settings or that would introduce malware into the car.”