Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Lock Your Car... and its App

Be Sure to Lock Your Car... and its App

As cars become more technologically advanced and reliant on computers, they become more likely targets for malware and cyber attacks. However, as researchers from Kaspersky have uncovered in an investigation into an assortment of connected-car mobile apps, car manufacturers may not be as committed to ensuring the security of their vehicles as drivers may want.

Two researchers from the security firm discovered that nine popular car-connected applications did not have sufficient security measures in place to defend the vehicle’s computer-controlled features. All but one app stored the username and/or password on the phone itself without any encryption to protect it. If these phones were to be rooted by a hacker, that hacker would then have access to their victim’s car. Otherwise, the hackers could disperse fraudulent versions of the apps that connect the phone to the car, and steal a user’s credentials that way, or even just utilize an overlay attack to effectively do the same thing.

While these kinds of security issues are not a new phenomenon, the researchers argue that we are still in the beginning stages of a potential outbreak of cybercrime creeping onto our roadways.

Hacker forums seem to be quietly interested as well, as the researchers did find a few posts offering the sale of car app credentials, along with PINs and VINs for numerous cars from assorted manufacturers. Speaking of the manufacturers, it became more and more clear that as they developed these technologies, they failed to keep the big picture in mind and focused more on providing a cool new selling point than they did on ensuring that their customers’ investments (and lives) were protected.

There are a few scenarios that may result: either the automotive manufacturing industry shapes up and provides a product that protects drivers from those trying to exploit their vehicles for their own gain, or they continue to produce vehicles with insufficient defenses until consumer backlash is enough to convince them of the need for change.

So what do you think? Is the convenience of having a car with all the abilities full connectivity provides a big enough benefit to risk it for you? Or would you rather wait until you knew your car would be safe before you buckled in? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Google Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Gadgets Cloud Computing Compliance Training Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Business Continuity Government Data Management Bandwidth Virtualization Wi-Fi Blockchain Business Technology Windows 10 Apps Data Security Mobile Office Two-factor Authentication Vendor Budget WiFi Apple Networking Employer-Employee Relationship App Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail Tip of the week Chrome Applications How To BDR Conferencing Hacker Computing Avoiding Downtime Physical Security Information Technology Marketing Access Control Office 365 HIPAA Retail Storage Big Data Password Bring Your Own Device 2FA Help Desk Managed IT Services Computers Healthcare Operating System Website Virtual Private Network Risk Management Health Analytics Office Tips Router Augmented Reality The Internet of Things Scam Social Windows 11 Data loss Monitoring Excel Going Green Patch Management Customer Service Remote Workers Save Money Managed IT Service Remote Monitoring Vulnerability Telephone End of Support Vendor Management Cybercrime Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Firewall Solutions Document Management User Tip Modem Mobile Security Processor Maintenance Sports Antivirus Mouse Holidays Data Storage Administration Smart Technology Supply Chain Video Conferencing Customer Relationship Management Managed Services Provider Saving Time Virtual Machines Professional Services Robot Hacking Settings Presentation Printing Wireless Downloads Content Filtering iPhone Wireless Technology Licensing IT Management VPN YouTube Meetings Vulnerabilities Entertainment Data Privacy Cryptocurrency Images 101 Computer Repair Word Telephone System Virtual Desktop Multi-Factor Authentication Mobility Data storage LiFi Cost Management Outlook Machine Learning Money Safety Employees Integration Humor Username Scary Stories Private Cloud Managing Costs Amazon Hacks Server Management Superfish Identity Theft eCommerce Fun Black Friday SSID Virtual Assistant Outsource IT Deep Learning Database Surveillance Twitter Error IT Technicians Virtual Machine Environment Media Proxy Server Reviews Education Application Cookies Social Engineering Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Remote Computing IBM Mirgation Hypervisor Displays Mobile Computing Shopping Tablet Nanotechnology Optimization Search PowerPoint Language Employer/Employee Relationships Outsourcing Best Practice Addiction Alert Managed IT Management PCI DSS Buisness File Sharing Chatbots Dark Data Navigation Legal Gig Economy IT solutions Screen Reader How To Distributed Denial of Service Workplace Notifications Computing Infrastructure Teamwork Hiring/Firing Business Growth Competition Service Level Agreement Internet Service Provider Regulations Compliance Travel Identity Evernote Paperless Techology Bookmark Google Maps Smart Tech Memes Cortana Co-managed IT Alerts SQL Server Technology Care Alt Codes Download Net Neutrality Financial Data Downtime Unified Threat Management User History Business Communications Unified Threat Management Browsers Smartwatch Hosted Solution Connectivity IT Break Fix Scams Upload Procurement Azure Hybrid Work Typing IP Address Social Network Telework Cyber security Network Congestion Multi-Factor Security Tech Human Resources Dark Web Cables Google Drive User Error CES IoT Communitications Knowledge Trends Supply Chain Management Customer Resource management FinTech Point of Sale Recovery Regulations 5G Google Calendar Term Google Apps Microsoft Excel IT Maintenance Google Docs Data Analysis Unified Communications Hard Drives Star Wars IT Assessment Experience Domains Gamification Flexibility Running Cable Tech Support Staff Value Business Intelligence Bitcoin Network Management Google Wallet Organization Social Networking Monitors Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras Refrigeration Smart Devices Public Speaking Content Remote Working Laptop Websites Wearable Technology Memory Vendors Windows 8 Drones Lithium-ion battery Health IT Motherboard Data Breach Comparison Google Play Be Proactive Entrepreneur Permissions Workforce SharePoint Directions Videos Assessment Electronic Health Records Electronic Medical Records Halloween Wasting Time Threats Lenovo Trend Micro Writing Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Undo Internet Exlporer Software as a Service Virtual Reality

Blog Archive