HOW SAFE ARE YOU IN YOUR EV? BY RICK TRADER

HOW SAFE ARE YOU IN YOUR EV?

The emerging cybersecurity threats posed by electric vehicles (EVs) and other complex, software-driven machines. With millions of lines of code in each vehicle and extensive wireless connections, the risks of hacking are growing, especially as EVs are increasingly integrated with the internet, charging infrastructure, and even the electricity grid.

Roy Fridman, CEO of C2A Security, highlights the complexity and vulnerabilities of modern vehicles, pointing out that as the number of communication protocols and software increases, so do the risks of malicious control. Potential hacks could range from theft of personal data at charging stations to more severe outcomes like disabling vehicle safety systems or causing battery fires.

The piece draws attention to the larger security implications of this interconnectedness, citing a recent incident in which Hezbollah members’ devices, modified with hidden explosives, were triggered remotely. Although this involved physical tampering, it underscores concerns over remote control of EV features. Furthermore, there have been instances of EV hacks—such as David Colombo’s takeover of Tesla features—that show just how vulnerable connected vehicles can be, even though some critical functions like steering remain secure for now.

The risks of hacking into an EV’s battery management system (BMS) are particularly alarming. If compromised, the BMS could fail to prevent a thermal runaway—a dangerous, uncontrolled battery fire. These fires can be extremely difficult to extinguish, as seen in a Tesla Semi fire that required 50,000 gallons of water.

Fridman emphasizes that while cybersecurity in industries like computing has matured, the automotive sector is still evolving in this regard. EVs, which increasingly rely on software, are transitioning from hardware-centric machines to “software-defined” products, bringing new cybersecurity challenges. Ultimately, cybersecurity for EVs requires a deep understanding of both the software systems and the physical components they control.

Leave a Reply

Your email address will not be published. Required fields are marked *