A Business Insider article claims that in 2015, two hackers took control of a Jeep Cherokee and that “From a couch 10 miles west of the highway, the two were able to toy with the car's air conditioning, blast the radio, activate the windshield wipers, and ultimately cut its transmission” (Muoio). With the advancements of technology in the past two years, this is a viable safety concern. With the right computer programs a hacker could take control of an autonomous vehicle and cause an accident before the passengers knew what was happening. Ways to block these transmissions must be developed to ensure the threat of an automobile being hacked is
A Business Insider article claims that in 2015, two hackers took control of a Jeep Cherokee and that “From a couch 10 miles west of the highway, the two were able to toy with the car's air conditioning, blast the radio, activate the windshield wipers, and ultimately cut its transmission” (Muoio). With the advancements of technology in the past two years, this is a viable safety concern. With the right computer programs a hacker could take control of an autonomous vehicle and cause an accident before the passengers knew what was happening. Ways to block these transmissions must be developed to ensure the threat of an automobile being hacked is