Foley & Lardner LLP

In addition, cars now feature a multitude of applications that can be accessed and controlled by a driver’s smartphone, which, itself, connects to the Internet. These connections may pave the way for a hacker to gain control of car’s systems and data. This is not fantasy, but fact. ................
................