ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Internet-Connected Cars Prove Easy Targets for Hackers

Internet-Connected Cars Prove Easy Targets for Hackers

Cars aren’t as simple as they used to be, particularly in regard to the technology that’s inside them. Nowadays, you’d be hard-pressed to find a new vehicle that isn’t vulnerable in some way to threats like malware or cyber attacks. The researchers at Kaspersky have proven that many apps that are connected to smart cars aren’t as secure as drivers expect them to be.

A pair of researchers have found that nine of the most popular car-connected apps have lackluster security features that keep them from protecting the drivers as best they can. The reason is simply because the apps store the usernames and passwords on the phones connected to the vehicles… without encryption. Considering how it’s a relatively simple feat for a hacker to root a smartphone, the hacker could easily gain access to the victim’s vehicle. In a worst-case scenario, a hacker could use fraudulent versions of these apps to tether the phone to a car and steal the user’s credentials, or use an overlay attack to accomplish virtually the same thing.

These types of attacks are nothing new, but they are concerning--especially since they could eventually turn into the beginnings of an epidemic, one which sweeps across roadways and threatens anyone who dares to set foot in a computerized vehicle.

Hackers that lurk online, hoping to find the latest threats and security troubles to take advantage of, have also shown interest in these exploits. Researchers have found posts that advertise the sale of these car app credentials, including PINs and VINs for various vehicles from all sorts of different manufacturers. When looking at these vulnerabilities, it has become clear that vehicle manufacturers have failed to adapt to the improvements (and failures) of vehicular technology security. While the connectivity is a great way to sell a car, you’d be hard-pressed to find a salesman who will admit that the vehicle you’re interested in could be vulnerable to hackers.

Therefore, the automotive industry will be left with an ultimatum: either step up and make vehicles more secure from online threats, or face the frustration of dealing with angry customers, eventually eroding their will enough to forcefully bring change to the manufacturing process.

What are your thoughts on owning a smart car? Do you think it’s worth the extra worry that comes from owning yet another device that needs protecting, or do you think that it’s worth the risk for the extra convenience? Let us know in the comments, and be sure to subscribe to our blog for more articles about technology and security.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Communication Managed IT Services Data Recovery Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Apps Managed Service Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Data Management Remote Work Internet of Things Operating System Government Saving Money Artificial Intelligence Managed IT services Gadgets Networking Windows Workplace Strategy Bandwidth Server Encryption App Blockchain Remote Virtualization Mobile Device Management Spam Business Technology Information WiFi Gmail Office Budget History Employee/Employer Relationship Two-factor Authentication Office 365 Apple Information Technology Cybercrime Access Control Data Security Big Data Wi-Fi BDR Health Conferencing Analytics Compliance Document Management Patch Management Save Money Help Desk Remote Monitoring Hacking Employer-Employee Relationship IT Management Training Remote Computing Hacker Cost Management Voice over Internet Protocol Vendor Legal Augmented Reality Word Vulnerabilities Data storage IBM Website Search... Project Management Best Practice Data loss Retail BYOD Alert Computing Hiring/Firing Vendor Management Hard Drive Outlook Money Password Mobile Office Customer Service Unified Threat Management Firewall Applications Managed Services Printer Update iPhone How To Education Cortana Mobile Computing Monitoring Content Filtering Healthcare Marketing Paperless Office Antivirus Travel Virtual Reality Router Running Cable Social Engineering Maintenance Cryptocurrency Black Market Storage The Internet of Things Cleaning YouTube Robot Websites Mobility Meetings Laptop Windows 11 User Google Maps Scam Remote Workers Twitter Data Breach Social Sports DDoS Windows 7 VPN Chrome SaaS Law Enforcement Free Resource End of Support Managed IT Digital PowerPoint Disaster Current Events Administration Identity Theft Solutions Hack Multi-factor Authentication Presentation Taxes Notifications Unified Communications Lithium-ion battery Specifications Images 101 Integration IT Consultant Google Docs Display Saving Time Bluetooth Customer Relationship Management Processors Distributed Denial of Service Physical Security Co-Managed IT Office Tips Computers Bitcoin Entertainment Private Cloud Employees Memory Avoiding Downtime Telephone Holidays Start Menu Downloads Computer Care Politics Settings Cooperation Excel Machine Learning Video Conferencing Wireless Technology Vulnerability eWaste Virtual Machines Software as a Service Solid State Drive Data Protection HIPAA Computer Repair Downtime Safety Professional Services Virtual Assistant Chromebook Drones Automobile Virtual Desktop Experience Managed Services Provider Processor How To Microchip Virtual Private Network Tech Terms Flexibility Communitications Navigation Microsoft 365 Cables Addiction email scam In Internet of Things Smartwatch Mobile Security Web Server Hacks Procurement Network Congestion User Tip SharePoint Legislation News Digital Payment Reliable Computing FinTech Writing CES IT Assessment Evernote Point of Sale Network Management Electronic Payment Worker Access Supply Chain Management Recovery Value Competition Cyber security Proxy Server Shortcuts Emails Time Management Fake News Public Cloud Scalability Organization LiFi Phone System Text Messaging Smart Devices Proactive IT Entrepreneur Service Level Agreement Computing Infrastructure Administrator Device security Spyware Bring Your Own Device Remote Working Documents Application Management Audit Trend Micro Be Proactive Business Intelligence Wireless Headphones Microsoft Excel File Sharing AI Digital Security Cameras Electronic Health Records Tech Music Transportation Going Green Redundancy Business Cards Cache Securty Wasting Time Error eCommerce Domains Bookmark Modem Workplace Strategies Unified Threat Management Workers Computer Accessories Botnet Videos Surveillance Term Download Piracy Printing HTML CCTV Rental Service Micrsooft Managing Costs Flash Browsers SSID Nanotechnology Touchscreen Media Computer Malfunction Telephone Systems Development Google Play Business Growth Employer/Employee Relationships Upload Emergency Software License Vendor Mangement Virtual Machine Public Speaking Social Network Optimization Data Analysis Smart Technology Screen Reader Samsung Reviews Streaming Media Uninterrupted Power Supply 2FA Webcam Banking Security Cameras Google Wallet Teamwork Keyboard Trends Mobile Technology Devices Business Mangement Troubleshooting Messenger Data Storage Deep Learning Hypervisor Hard Drives Customer Resource management Fileless Malware Medical IT intranet Tip of the week Tablets Shopping Paperless Business Metrics Wireless Hosted Solution SQL Server Shortcut Gamification Company Culture Google Calendar Environment Regulations Supercomputer Books PCI DSS Licensing Heating/Cooling Telephone System Language Humor Directions Society Supply Chain Social Networking Backup and Disaster Recovery Virus Gig Economy Windows XP Business Communications Motion Sickness Internet Service Provider Azure Content Desktop Visible Light Communication Comparison Accountants Google Drive Business Owner Reading Regulations Compliance Monitors Managed IT Service Electronic Medical Records Memes Windows 8 Workplace Database Corporate Profile Human Resources Net Neutrality Knowledge Advertising Television Equifax Telephony Employer Employee Relationship Relocation Financial Data Displays Health IT Work/Life Balance IT Tech Support Scams Tactics Hard Drive Disposal Cabling Risk Management Tablet Google Apps G Suite Staffing Username Mouse Startup VoIP Freedom of Information Inbound Marketing Tracking Telework IP Address

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?