• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechHacking

Security Experts Say That Hacking Cars Is Easy

By
Jonathan Vanian
Jonathan Vanian
Down Arrow Button Icon
By
Jonathan Vanian
Jonathan Vanian
Down Arrow Button Icon
January 26, 2016, 6:47 PM ET

Automobiles may be getting more advanced, but that doesn’t mean they are immune to hacks.

The latest cars, stuffed with technology that collects driving data and makes keys obsolete, are far “smarter” than older vehicles. However, all those features come at a cost when it comes to how easily hackers can infiltrate car computer systems.

Security researchers from the University of Washington and the University of California, San Diego took to the stage at a conference on Tuesday to describe how they were able to remotely break into vehicle electronics through an array of security holes. Speaking at the Enigma Security Conference in San Francisco, they discussed how cars have evolved over the years into computers on wheels that crafty hackers can penetrate under the right circumstances.

Get Data Sheet, Fortune’s technology newsletter.

One particularly sensitive entry point for hacking is the legally required OBD II port, which is basically “the Ethernet jack for your car,” said Stefan Savage, a University of California, San Diego professor of computer science and engineering. It is typically located below the dashboard on the driver’s side.

This port acts as the car’s command center that connects to all of the different computers systems, said Savage. Mechanics often plug directly into this port to retrieve diagnostics for the car’s emissions, mileage, and engine errors.

However, hackers who directly connect their laptops to the port through an intermediary device can basically plug into car’s control system and “have access to everything,” said Savage. “Once you get inside this network, all bets are off,” he said.

With cars containing multiple computers coupled together through a maze of networks, it’s also possible to break into the car’s command center without having to physically plug something into the port. Hackers just have to find a hole somewhere within one of the networks to sneak in.

These holes are often created from software conflicts that emerge when code from one device like a CD player communicates with code from another device like a car’s on-boarding system. There’s so much code in a typical car from so many different vendors that it can be virtually impossible for auto makers to know all the software inside their vehicles, he explained.

In 2010, Savage and his and his research team demonstrated how they were able to wirelessly hack into the command centers of a 2009 Chevy Impala through the OBD-II port. They were able to manipulate the car’s braking system so that the vehicle suddenly stopped or failed to function at all.

Wired reported that it took General Motors (GM) five years to completely fix the bug and ensure that future models wouldn’t have the same vulnerabilities.

Savage stressed that the hacking incident on GM and similar research-led hackings into car models like the Toyota Prius and Ford (F) Escape don’t show that any one company’s cars are more vulnerable than the next. Instead, it’s an industry wide problem. It used to be that manufacturers didn’t typically have cyber security response teams or other means to effectively deal with the issues, he explained.

Indeed, at the time of the Chevy Impala hack, GM “didn’t have anyone to deal with cyber security” and regulators didn’t know how to address the problem, said Savage. However, his team worked closely with GM to fix the problem and the company has since installed a chief security officer in charge of product and now has a 100-person strong cyber security team. The company also changed its overall development progress and is trying to patch possible bugs in its systems before they become public, he explained.

“I’m not going to tell you there aren’t vulnerabilities in GM’s cars, but they are in a much better position than what we started in 2010,” said Savage.

For more on GM watch our video:

It’s worth noting that the researchers were able to pull off their hacks in staged projects in the lab. Just because they discovered them “doesn’t mean [the problems] will necessarily manifest in the real world,” said University of Washington professor of computer science and engineering Tadayoshi Kohno.

The researchers argued that security experts must continue to make bugs public if the auto industry fails to address its loose security standards. Hopefully, they said, it will prevent disasters before they happen on the road.

 

About the Author
By Jonathan Vanian
LinkedIn iconTwitter icon

Jonathan Vanian is a former Fortune reporter. He covered business technology, cybersecurity, artificial intelligence, data privacy, and other topics.

See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

A Macy's entrance in a mall.
RetailMacy's
Macy’s just launched an AI-powered shopping assistant. Customers who use it spend nearly 400% more 
By Jacqueline MunisMarch 27, 2026
3 hours ago
Meta's Hyperion data-center site in Northeastern Louisiana.
EnergyMeta
Meta orders 10 gas-fired power plants for its Hyperion AI campus in rural Louisiana—more than triple the initial plan
By Jordan BlumMarch 27, 2026
4 hours ago
LawMeta
Meta promised it wouldn’t spy on you with its AI smart glasses. A lawsuit says humans are watching you, actually
By Catherina GioinoMarch 27, 2026
4 hours ago
Steve Wozniak speaks into a microphone, raising his palm in the air.
Big TechApple
Apple cofounder Steve Wozniak admits he’s ‘disappointed a lot’ by AI and hardly uses it: ‘They just sound too dry and too perfect’
By Sasha RogelbergMarch 27, 2026
5 hours ago
AIData centers
Microsoft is picking up a Texas data center project OpenAI didn’t want, in a telling sign of how far they’ve drifted apart
By Matt O'Brien and The Associated PressMarch 27, 2026
7 hours ago
InnovationDrones
The Army and Amazon are creating an online storefront to buy drones as the technology transforms the battlefield
By Jason MaMarch 27, 2026
7 hours ago

Most Popular

Success
Meetings are not work, says Southwest Airlines CEO—and he’s taking action by blocking his calendar every afternoon from Wednesday to Friday 
By Fortune EditorsMarch 27, 2026
16 hours ago
AI
Exclusive: Anthropic acknowledges testing new AI model representing ‘step change’ in capabilities, after accidental data leak reveals its existence
By Fortune EditorsMarch 26, 2026
23 hours ago
AI
Exclusive: Anthropic left details of an unreleased model, invite-only CEO retreat, sitting in an unsecured data trove in a significant security lapse
By Fortune EditorsMarch 26, 2026
23 hours ago
Success
Palantir’s billionaire CEO says only two kinds of people will succeed in the AI era: trade workers — ‘or you’re neurodivergent’
By Fortune EditorsMarch 24, 2026
3 days ago
Environment
Vail Resorts CEO says it’s time to think beyond the $1,000 ski pass that helped build the empire
By Fortune EditorsMarch 26, 2026
2 days ago
Commentary
The Treasury just declared the U.S. insolvent. The media missed it
By Fortune EditorsMarch 23, 2026
4 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.