According to a survey by the AAA Foundation for Traffic Safety, Americans spend close to 300 hours a year behind the wheel of their cars. And for some of us that number is much more. We trust our cars to get us where we want to go safely, but what information does our car have on us that could be collected and then used by other sources?
Due to GPS location devices and in dash software, your car can gather data about many aspects of your life, like where you live and work, what music you like, and just how fast you like to drive on the highways.
Like anything else, this kind of information can be used for positive effect, or it can be used for more nefarious purposes. As cars build up more technology there is no end to what they might be able to report about you. Luxury automobiles feature more external sensors and cameras to help you use the road more effectively, but some new cars, like the Tesla Model S, have internal cameras as well. Their reported purpose is to make sure you are not distracted while driving, but they may do much more. And automobile manufacturers currently have a good deal of latitude regarding what they do with the information they collect.
The GM Marketplace that allows for in-app purchases from your car is a good example of what they might like to do with data that understands your driving and purchasing habits. The Zebra has put together an infographic that outlines all the ways your car may be gathering data about you and what you can do to make sure that this is not used by companies or hackers to undermine your privacy or safety.
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
- Blog2022.10.12Vulnerability management with Wazuh open source XDR
- Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
- Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky