by Lufuno T Khorommbi
Have you thought about your car from a cyber security perspective? Which cars are we referring to? Cars that have the ability to connect to a smartphone; ability to connect to the Wi-Fi; ability to connect to Bluetooth and share information between the car and the Bluetooth device and or import information from the Bluetooth device to the car; ability to perform on android auto operating system. (This system can function independently from the phone)
Where does the problem come from?
A car with advanced technology is more like a smart device.
Every activity that its computerized functionalities perform gets recorded on the computer box; which is more like your brain of the car (memory).
The memory then makes performance of future activities much easier because the car is able to remember what, and how it performed last time.
For example:
If you make a call or make any form of contact through the car computer system, it records such an activity. It works like a phone book, only that it is stored in the car system.
When you travel using GPS, either through the phone or android system, it will record where you have been, it can show where you are headed as well.
Sometimes drivers will also record different trips addresses by name like school, work, home.
This may not only pose risks to the driver’s security should someone else have access to the car, it also compromises the driver’s right to privacy.
What happens if I am ignorant about the risks that comes with the advanced high tech cars?
Since the car keeps a memory of the driver’s personal and sensitive information; it poses a security risk for the driver, and possibly his/her family. How so?
There are tracker devices that uses GPS, and Bluetooth to track the car. Drivers should learn how these systems works to minimise security risks.
Previously I have highlighted that the use of Wi-Fi, Bluetooth, and GPS can pose a security risk if not well managed. Similar dangers remain.
Therefore, as long as someone can beach the security on one of the devices connected to the car; the security of the car can also be breached.
Drivers of cars with high technology are tempted to show off, but that might just be making them vulnerable to both cyber and physical attacks.
What should a driver do to minimize the risks?
Modern cars are a computer that stores a lot of information about the driver, just like the smart phone.
Therefore, visits to the service, car wash, or simply just borrowing the car to someone can pose a risk.
Therefore, the driver should try to reset the computer system more often.
Otherwise, third parties may have access to the system by using Bluetooth device or USB to import the information.
If the driver wants to sell the car, it is important to reset the computer box. Why
Unless sanitized, every personal information ever stored in the car including alarm system and other personal passwords still remains in the computer box.
It is important to have the tracker removed or transferred to the new vehicle. The danger of leaving the tracker is in two-fold:
The seller’s information is still linked to the sold car; and
The seller would still receive the tracking information regarding the whereabouts of the car; which might pose danger to the new owner.
How to reset or where to go for help with reset?
Drivers must visit their car manuals to learn how to do a reset on the car system
Where there are difficulties, drivers can always take their cars to the authorized dealership for their model and have the reset done by professionals.
Remember to disconnect all devices connected to the car, including the smart phone and tracker.
Adv. Lufuno T Khorommbi (Ms) is a specialist Cyber Law Consultant and the Managing Director of Orizur Consulting Enterprise. Her expertise lies in cyber law, cyber security, IT Procurement, Contract Management, Research and Policy Management. She is a Mentee of the Cherie Blair Foundation Global Women’s Mentoring Programme; a Member of South Africa Institute of Intellectual Property Law; a MICT SETA 4IR Advisory Committee Member; LLM specialization in IT Law; Certified in CIO Practice; she holds a Certificate in Cyber Security and a Certificate in Legislative Drafting.
www.orizur.co.za
More articles by Lufuno