Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Lock Your Car... and its App

Be Sure to Lock Your Car... and its App

As cars become more technologically advanced and reliant on computers, they become more likely targets for malware and cyber attacks. However, as researchers from Kaspersky have uncovered in an investigation into an assortment of connected-car mobile apps, car manufacturers may not be as committed to ensuring the security of their vehicles as drivers may want.

Two researchers from the security firm discovered that nine popular car-connected applications did not have sufficient security measures in place to defend the vehicle’s computer-controlled features. All but one app stored the username and/or password on the phone itself without any encryption to protect it. If these phones were to be rooted by a hacker, that hacker would then have access to their victim’s car. Otherwise, the hackers could disperse fraudulent versions of the apps that connect the phone to the car, and steal a user’s credentials that way, or even just utilize an overlay attack to effectively do the same thing.

While these kinds of security issues are not a new phenomenon, the researchers argue that we are still in the beginning stages of a potential outbreak of cybercrime creeping onto our roadways.

Hacker forums seem to be quietly interested as well, as the researchers did find a few posts offering the sale of car app credentials, along with PINs and VINs for numerous cars from assorted manufacturers. Speaking of the manufacturers, it became more and more clear that as they developed these technologies, they failed to keep the big picture in mind and focused more on providing a cool new selling point than they did on ensuring that their customers’ investments (and lives) were protected.

There are a few scenarios that may result: either the automotive manufacturing industry shapes up and provides a product that protects drivers from those trying to exploit their vehicles for their own gain, or they continue to produce vehicles with insufficient defenses until consumer backlash is enough to convince them of the need for change.

So what do you think? Is the convenience of having a car with all the abilities full connectivity provides a big enough benefit to risk it for you? Or would you rather wait until you knew your car would be safe before you buckled in? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Microsoft Cybersecurity Passwords Communication Data Backup Smartphone Backup Saving Money VoIP Business Management Smartphones Android Mobile Devices communications Upgrade Managed Service Disaster Recovery Browser Data Recovery Managed IT Services Social Media Microsoft Office Windows Network Tech Term Remote Internet of Things Current Events Automation Facebook Productivity Artificial Intelligence Gadgets Cloud Computing Covid-19 Miscellaneous AI Server Managed Service Provider Remote Work Outsourced IT Information Holiday Encryption Spam Employee/Employer Relationship Windows 10 Compliance Office Government Business Continuity Training Data Management Business Technology Virtualization Wi-Fi Blockchain Bandwidth Windows 10 Apps Data Security Two-factor Authentication Mobile Office Apple App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking BYOD Chrome Vendor Mobile Device Management Budget Gmail Tip of the week WiFi Conferencing Computing How To Information Technology BDR Hacker Avoiding Downtime Office 365 Marketing IT Support Applications Access Control Help Desk Big Data Retail Healthcare Operating System Managed IT Services Risk Management Computers Analytics Website Office Tips HIPAA Augmented Reality Router Virtual Private Network Storage Password Health Bring Your Own Device Monitoring 2FA The Internet of Things Excel Document Management Going Green Social Remote Workers Telephone Scam Cybercrime Data loss Cooperation Free Resource Customer Service Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Display Firewall Printer Windows 11 Paperless Office Infrastructure Safety Data Storage Smart Technology Supply Chain Administration Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Managed IT Service Settings Maintenance Printing Antivirus Wireless Downloads iPhone Content Filtering Licensing Customer Relationship Management YouTube Vulnerabilities Entertainment Data Privacy Cryptocurrency Hacking Images 101 Presentation Virtual Desktop Telephone System Multi-Factor Authentication Robot Mobility Data storage LiFi Wireless Technology Cost Management Outlook IT Management Money VPN Employees Meetings Word Integration Humor User Tip Modem Computer Repair Mobile Security Processor Sports Mouse Holidays Mobile Computing Websites Mirgation Hypervisor Displays PowerPoint Shopping Undo Search Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Best Practice SharePoint Buisness Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Workplace Legal IT solutions Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Business Growth Server Management Regulations Compliance Application Private Cloud Identity Evernote Paperless Co-managed IT Superfish Bookmark Cortana Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Technology Care Alt Codes IBM Downtime Financial Data Error History Business Communications Social Engineering Break Fix Scams Hosted Solution Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Typing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Google Drive CES Competition Knowledge Tablet IoT Communitications Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech 5G File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Google Docs Unified Communications Data Analysis Experience Star Wars IT Assessment Running Cable Gamification Flexibility User Notifications Staff Value Business Intelligence Bitcoin Google Wallet Organization Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices IP Address Laptop Content Remote Working Wearable Technology Memory Vendors Windows 8 Drones Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Halloween Recovery Wasting Time Threats Hard Drives Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Fraud Meta User Error Microchip Domains Hacks Scary Stories Username Managing Costs Amazon Black Friday SSID Refrigeration Fun Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Deep Learning Public Speaking Lithium-ion battery Network Management Tech Support IT Technicians Virtual Machine Environment Media Monitors Cyber Monday Medical IT Education Proxy Server Reviews Cookies Entrepreneur Tactics Development Hotspot Transportation Small Businesses

Blog Archive