Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Internet-Connected Cars Prove Easy Targets for Hackers

Internet-Connected Cars Prove Easy Targets for Hackers

Cars aren’t as simple as they used to be, particularly in regard to the technology that’s inside them. Nowadays, you’d be hard-pressed to find a new vehicle that isn’t vulnerable in some way to threats like malware or cyber attacks. The researchers at Kaspersky have proven that many apps that are connected to smart cars aren’t as secure as drivers expect them to be.

A pair of researchers have found that nine of the most popular car-connected apps have lackluster security features that keep them from protecting the drivers as best they can. The reason is simply because the apps store the usernames and passwords on the phones connected to the vehicles… without encryption. Considering how it’s a relatively simple feat for a hacker to root a smartphone, the hacker could easily gain access to the victim’s vehicle. In a worst-case scenario, a hacker could use fraudulent versions of these apps to tether the phone to a car and steal the user’s credentials, or use an overlay attack to accomplish virtually the same thing.

These types of attacks are nothing new, but they are concerning--especially since they could eventually turn into the beginnings of an epidemic, one which sweeps across roadways and threatens anyone who dares to set foot in a computerized vehicle.

Hackers that lurk online, hoping to find the latest threats and security troubles to take advantage of, have also shown interest in these exploits. Researchers have found posts that advertise the sale of these car app credentials, including PINs and VINs for various vehicles from all sorts of different manufacturers. When looking at these vulnerabilities, it has become clear that vehicle manufacturers have failed to adapt to the improvements (and failures) of vehicular technology security. While the connectivity is a great way to sell a car, you’d be hard-pressed to find a salesman who will admit that the vehicle you’re interested in could be vulnerable to hackers.

Therefore, the automotive industry will be left with an ultimatum: either step up and make vehicles more secure from online threats, or face the frustration of dealing with angry customers, eventually eroding their will enough to forcefully bring change to the manufacturing process.

What are your thoughts on owning a smart car? Do you think it’s worth the extra worry that comes from owning yet another device that needs protecting, or do you think that it’s worth the risk for the extra convenience? Let us know in the comments, and be sure to subscribe to our blog for more articles about technology and security.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 03 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Google Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Hardware Network Security Ransomware Hacking WiFi Facebook Operating System Microsoft Office Office The Internet of Things Social Media Backup Apps Bandwidth Business Continuity Disaster Recovery Communication Employer-Employee Relationship Money History Mobile Device Management Two-factor Authentication Network Small Business Phishing App Managed Service Provider Outlook Mobile Computing Big Data communications Safety Wireless Technology Unified Threat Management Android Quick Tips Apple Best Practice Firewall Alert Content Filtering Cybercrime Networking Data storage Website Data Windows Smartphones Experience Downtime BYOD Passwords Streaming Media Application Help Desk Micrsooft Managed IT services Visible Light Communication Customer Service Disaster Business Growth Data Management Robot Bluetooth Advertising Recovery Router Sports Society Office 365 Google Wallet Automation Spam Saving Money Memory Information Technology Analytics Running Cable Internet of Things intranet Windows 8 Lithium-ion battery Hosted Solution Deep Learning Windows XP IT Services BDR Artificial Intelligence Documents Compliance Social Networking Tech Support Drones Vendor Management Public Speaking Social IP Address Virtualization Browser Printer Monitors Virtual Desktop Wireless Government Unified Communications Augmented Reality Securty Keyboard Encryption User Document Management Search Law Enforcement Displays SaaS Hard Drives VoIP Remote Computing Shortcut Cortana Proactive IT DDoS Network Congestion End of Support Heating/Cooling Word Save Money Music Writing Business Management Laptop Cryptocurrency Competition IBM Google Docs Education Presentation Entrepreneur Holiday Cleaning Domains Black Market YouTube Processors Office Tips Retail LiFi Hacker Staffing
QR-Code