Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Lock Your Car... and its App

Be Sure to Lock Your Car... and its App

As cars become more technologically advanced and reliant on computers, they become more likely targets for malware and cyber attacks. However, as researchers from Kaspersky have uncovered in an investigation into an assortment of connected-car mobile apps, car manufacturers may not be as committed to ensuring the security of their vehicles as drivers may want.

Two researchers from the security firm discovered that nine popular car-connected applications did not have sufficient security measures in place to defend the vehicle’s computer-controlled features. All but one app stored the username and/or password on the phone itself without any encryption to protect it. If these phones were to be rooted by a hacker, that hacker would then have access to their victim’s car. Otherwise, the hackers could disperse fraudulent versions of the apps that connect the phone to the car, and steal a user’s credentials that way, or even just utilize an overlay attack to effectively do the same thing.

While these kinds of security issues are not a new phenomenon, the researchers argue that we are still in the beginning stages of a potential outbreak of cybercrime creeping onto our roadways.

Hacker forums seem to be quietly interested as well, as the researchers did find a few posts offering the sale of car app credentials, along with PINs and VINs for numerous cars from assorted manufacturers. Speaking of the manufacturers, it became more and more clear that as they developed these technologies, they failed to keep the big picture in mind and focused more on providing a cool new selling point than they did on ensuring that their customers’ investments (and lives) were protected.

There are a few scenarios that may result: either the automotive manufacturing industry shapes up and provides a product that protects drivers from those trying to exploit their vehicles for their own gain, or they continue to produce vehicles with insufficient defenses until consumer backlash is enough to convince them of the need for change.

So what do you think? Is the convenience of having a car with all the abilities full connectivity provides a big enough benefit to risk it for you? Or would you rather wait until you knew your car would be safe before you buckled in? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet Efficiency IT Support User Tips Malware Privacy Email Phishing Workplace Tips Google Computer Collaboration Users IT Services Hosted Solutions Mobile Device Ransomware Quick Tips Cybersecurity Small Business Workplace Strategy Microsoft Data Backup Communication Smartphone Saving Money Business Management Smartphones VoIP Android Mobile Devices communications Backup Data Recovery Passwords Managed IT Services Managed Service Upgrade Browser Social Media Microsoft Office Disaster Recovery Tech Term Network Internet of Things Remote Automation Facebook Artificial Intelligence Covid-19 Cloud Computing Windows Miscellaneous Gadgets Remote Work Server Managed Service Provider Outsourced IT Current Events Productivity Information Spam Encryption Employee/Employer Relationship Windows 10 AI Holiday Data Management Compliance Business Continuity Government Office Training Windows 10 Business Technology Virtualization Blockchain Wi-Fi Two-factor Authentication Bandwidth Apps Data Security Mobile Office Mobile Device Management Gmail Managed Services Voice over Internet Protocol Chrome Budget Employer-Employee Relationship Apple Networking App Vendor Access Control Conferencing Office 365 Tip of the week WiFi How To BDR Hacker Applications Avoiding Downtime BYOD Computing Information Technology Health Office Tips Analytics Healthcare Augmented Reality Big Data Retail Storage Password Bring Your Own Device Managed IT Services HIPAA Router Computers Operating System Website Marketing Help Desk Virtual Private Network Risk Management Printer Excel Firewall Paperless Office Infrastructure Remote Workers IT Support Telephone The Internet of Things Document Management Social Cooperation Free Resource Project Management Scam Windows 7 Data loss Microsoft 365 Customer Service Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Windows 11 2FA Monitoring Display Computer Repair Video Conferencing Managed Services Provider Saving Time Virtual Machines Virtual Desktop Professional Services Data storage LiFi Managed IT Service Safety Outlook Machine Learning Downloads Money iPhone Humor Licensing Entertainment Vulnerabilities Maintenance Data Privacy Antivirus Sports Images 101 Mouse Multi-Factor Authentication Mobility Telephone System Customer Relationship Management Cost Management Administration Hacking Presentation Robot Employees Integration Settings User Tip Wireless Technology Printing Modem Wireless Processor Mobile Security Content Filtering IT Management VPN Holidays YouTube Meetings Physical Security Cryptocurrency Data Storage Word Smart Technology Supply Chain Experience Google Docs Addiction Unified Communications Language Employer/Employee Relationships Outsourcing Bitcoin Network Management Chatbots Running Cable Tech Support Navigation Management PCI DSS Refrigeration Gig Economy Public Speaking Google Wallet Screen Reader Distributed Denial of Service Workplace Monitors Lithium-ion battery Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Windows 8 Identity Entrepreneur Laptop Websites Evernote Paperless Regulations Compliance Bookmark Drones Smart Tech Memes Co-managed IT Electronic Medical Records SharePoint Download Net Neutrality Alerts SQL Server Technology Care Undo History Halloween Business Communications Financial Data Browsers Smartwatch Lenovo Connectivity IT Break Fix Scams Writing Virtual Reality Upload Procurement Azure Hybrid Work Hacks Server Management Cyber security Scary Stories Private Cloud Multi-Factor Security Tech Human Resources Social Network Telework CES Superfish IoT Communitications Identity Theft Dark Web Cables Fun Twitter Trends Supply Chain Management Application Deep Learning Regulations Error Google Calendar Term Google Apps Customer Resource management FinTech Data Analysis IBM Star Wars IT Assessment Education Microsoft Excel IT Maintenance Social Engineering Remote Computing Gamification Flexibility Staff Value Business Intelligence Mobile Computing Social Networking Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Smart Devices Tablet Ransmoware Search Alert Content Remote Working Best Practice Wearable Technology Memory Vendors Competition Managed IT Motherboard Data Breach Buisness File Sharing Comparison Google Play Be Proactive Dark Data Health IT Directions Videos Legal Assessment Electronic Health Records IT solutions Permissions Workforce How To Notifications Business Growth Wasting Time Threats Trend Micro Travel Specifications Security Cameras Workplace Strategies Microchip Techology Internet Exlporer Software as a Service User Google Maps Fraud Meta Cortana Username Alt Codes Managing Costs Amazon eCommerce Downtime Unified Threat Management Black Friday SSID IP Address Unified Threat Management Database Surveillance Hosted Solution Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Typing Proxy Server Reviews Cookies Cyber Monday Medical IT Network Congestion Google Drive User Error Tactics Development Recovery Hotspot Transportation Small Businesses Knowledge Mirgation Hypervisor Displays Hard Drives Shopping Domains Nanotechnology Optimization Point of Sale PowerPoint 5G

Blog Archive