We Hack a Car (It’s Way Easier than You Might Think)

With so many components of our vehicles running on and communicating via networked, cloud-based systems, and with an exponential number more on the horizon as cars begin to link to each other via vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-whatever-else (V2X) technology, we need to make sure that our individual vehicles are protected from theft or interference, and that the entire connected web of vehicles will not be turned into a plaything for hackers…