Car Connectivity Consortium

How secure is your vehicle with digital key technology?
Digital key technology allows mobile devices to streamline approval for everyday access points, making it a fitting solution for the automotive industry. While there are a few …

Digital Key Release 3 v1.1: Store, authenticate, securely share vehicle digital keys
The Car Connectivity Consortium (CCC) released its Digital Key Release 3 v1.1 and is now available to CCC members and to the public. Digital Key is a standardized ecosystem …
CCC Digital Key 3.0 enables drivers and passengers to use their mobile device as a digital key hands-free
The Car Connectivity Consortium (CCC) announced that its CCC Digital Key Release 3.0 specification is finalized and now available to CCC members. The new specification enables …
CCC Digital Key Release 3.0 enables consumers to use their mobile device as a digital key hands-free
The Car Connectivity Consortium (CCC) announced that its Digital Key Release 3.0 specification – which adds Bluetooth Low Energy and Ultra Wideband (UWB) wireless connectivity …
Trustonic to contribute to the development of secure connected car technologies
Mobile security leader Trustonic announces that it has joined the Car Connectivity Consortium (CCC) to contribute to the development of technical specifications for secure …
CCC’s Digital Key Release 2.0 specification to be completed by end of 2019
The Car Connectivity Consortium (CCC) announced that its Digital Key Release 2.0 specification, which leverages Near Field Communication (NFC) technology to enable compatible …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility