ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Internet-Connected Cars Prove Easy Targets for Hackers

Internet-Connected Cars Prove Easy Targets for Hackers

Cars aren’t as simple as they used to be, particularly in regard to the technology that’s inside them. Nowadays, you’d be hard-pressed to find a new vehicle that isn’t vulnerable in some way to threats like malware or cyber attacks. The researchers at Kaspersky have proven that many apps that are connected to smart cars aren’t as secure as drivers expect them to be.

A pair of researchers have found that nine of the most popular car-connected apps have lackluster security features that keep them from protecting the drivers as best they can. The reason is simply because the apps store the usernames and passwords on the phones connected to the vehicles… without encryption. Considering how it’s a relatively simple feat for a hacker to root a smartphone, the hacker could easily gain access to the victim’s vehicle. In a worst-case scenario, a hacker could use fraudulent versions of these apps to tether the phone to a car and steal the user’s credentials, or use an overlay attack to accomplish virtually the same thing.

These types of attacks are nothing new, but they are concerning--especially since they could eventually turn into the beginnings of an epidemic, one which sweeps across roadways and threatens anyone who dares to set foot in a computerized vehicle.

Hackers that lurk online, hoping to find the latest threats and security troubles to take advantage of, have also shown interest in these exploits. Researchers have found posts that advertise the sale of these car app credentials, including PINs and VINs for various vehicles from all sorts of different manufacturers. When looking at these vulnerabilities, it has become clear that vehicle manufacturers have failed to adapt to the improvements (and failures) of vehicular technology security. While the connectivity is a great way to sell a car, you’d be hard-pressed to find a salesman who will admit that the vehicle you’re interested in could be vulnerable to hackers.

Therefore, the automotive industry will be left with an ultimatum: either step up and make vehicles more secure from online threats, or face the frustration of dealing with angry customers, eventually eroding their will enough to forcefully bring change to the manufacturing process.

What are your thoughts on owning a smart car? Do you think it’s worth the extra worry that comes from owning yet another device that needs protecting, or do you think that it’s worth the risk for the extra convenience? Let us know in the comments, and be sure to subscribe to our blog for more articles about technology and security.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Covid-19 Disaster Recovery Managed Service IT Support Browser Windows 10 Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Remote Work Internet of Things Data Management Saving Money Operating System Government Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Gadgets Information Encryption Business Technology App Virtualization WiFi Spam Mobile Device Management Server Blockchain Remote Bandwidth Gmail Office Budget Two-factor Authentication Office 365 Employee/Employer Relationship Apple Information Technology History Health Big Data Analytics Wi-Fi Access Control Data Security Conferencing Cybercrime BDR Document Management Voice over Internet Protocol Vendor Save Money IT Management Help Desk Training Remote Computing Hacking Hacker Patch Management Cost Management Remote Monitoring Employer-Employee Relationship Compliance Retail Alert IBM Data storage Mobile Office Applications Website Hiring/Firing Managed Services Outlook Vulnerabilities Password BYOD Computing Vendor Management Money Hard Drive Data loss Customer Service Unified Threat Management Search... Firewall Project Management Best Practice Legal Augmented Reality Word Data Breach Websites Content Filtering Remote Workers Mobility Meetings Windows 7 Router User Free Resource Travel Google Maps Virtual Reality Scam Social Engineering Cryptocurrency The Internet of Things Monitoring Black Market YouTube How To Healthcare Cleaning VPN Chrome Robot Laptop Update Mobile Computing Marketing Paperless Office Social Sports Antivirus DDoS Twitter Running Cable SaaS Maintenance Windows 11 Law Enforcement Storage End of Support iPhone Printer Cortana Education Downloads Computer Care Hack Lithium-ion battery Identity Theft Vulnerability Notifications Unified Communications Processor Managed Services Provider Software as a Service Processors Data Protection Google Docs HIPAA Bluetooth Virtual Private Network Distributed Denial of Service Office Tips Memory Current Events Private Cloud Multi-factor Authentication Solutions Tech Terms Wireless Technology Integration Politics Saving Time Images 101 eWaste Settings Display Machine Learning Managed IT Computers PowerPoint Bitcoin Digital Administration Downtime Solid State Drive Safety Telephone Employees Presentation Avoiding Downtime Taxes Specifications Chromebook IT Consultant Drones Virtual Desktop Holidays Excel Experience Automobile Cooperation Customer Relationship Management Video Conferencing Co-Managed IT Physical Security Entertainment How To Virtual Machines Microchip Computer Repair Virtual Assistant Disaster Flexibility Professional Services Start Menu Writing Business Communications Database Internet Service Provider Recovery Azure Vendor Mangement Competition Reliable Computing Samsung Regulations Compliance Managed IT Service Memes Uninterrupted Power Supply Entrepreneur Workplace Health IT Webcam Equifax LiFi Human Resources Tactics Troubleshooting Net Neutrality Hard Drive Disposal Documents Business Mangement Application Scalability Administrator Tablets Business Intelligence Text Messaging Username Proactive IT Financial Data IT Freedom of Information Scams Bring Your Own Device Risk Management Startup Google Apps Addiction email scam Google Calendar Securty Navigation Supercomputer Virus Domains Music Telework Mobile Security Communitications News Microsoft 365 Cables User Tip Motion Sickness Smartwatch Legislation Network Management Business Owner Procurement Comparison Google Drive Evernote Botnet FinTech IT Assessment Fake News Knowledge Corporate Profile Point of Sale Rental Service Proxy Server Micrsooft CES Emails Employer Employee Relationship Flash Service Level Agreement Supply Chain Management Computing Infrastructure Television Value Telephony Public Speaking Cabling Shortcuts Telephone Systems Management Business Growth Organization Device security Streaming Media Cyber security Wireless Headphones Smart Devices Microsoft Excel Tablet Keyboard G Suite Tech Tracking Going Green Inbound Marketing Remote Working Business Cards Mouse VoIP Hard Drives intranet Be Proactive Banking Error Google Wallet AI Trend Micro Electronic Health Records Wireless Transportation Shortcut Messenger Bookmark Web Server Deep Learning Digital Security Cameras Term Digital Payment Environment Download Piracy SharePoint Wasting Time Heating/Cooling Modem Worker Social Networking Workplace Strategies Business Metrics Electronic Payment Hosted Solution HTML Windows XP eCommerce Nanotechnology Surveillance Access Books Browsers Videos Google Play Public Cloud Language Upload Society Software License Managing Costs Time Management SSID Social Network Phone System Screen Reader Visible Light Communication Development Audit Employer/Employee Relationships Spyware Reading Data Analysis Monitors Media Security Cameras File Sharing Trends Windows 8 Mobile Technology Virtual Machine Redundancy Smart Technology Customer Resource management Reviews Devices Optimization 2FA Advertising Tip of the week Staffing Teamwork Cache Relocation Fileless Malware Displays Workers Work/Life Balance Gamification Tech Support Data Storage Company Culture Computer Accessories Hypervisor Unified Threat Management IP Address Medical IT Telephone System Shopping Regulations Paperless Backup and Disaster Recovery Printing SQL Server Directions CCTV In Internet of Things Content PCI DSS Desktop Licensing Touchscreen Humor Emergency Supply Chain Hacks Electronic Medical Records Computer Malfunction Network Congestion Gig Economy Accountants

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?