In our previous blog post we’ve reviewed the different phases in a targeted car cyber attack. As cars become more intelligent and drive themselves, we are increasingly susceptible to our vehicles being hacked.In this post we’ll dive deep into the intrusion phase.Today’s vehicles are not self-contained.Before the arrival of vehicle connectivity, cars were deemed to be self-contained systems with wired, peer-to-peer networks connecting systems and components. The design assumptions and use cases
C2A Security is an Israel-based cybersecurity platform that offers solutions including embedded security and threat identification for the automotive industry.