In 2000, the fastest-moving and most widespread virus in history hit 3 million PCs in just six hours. Can you guess the subject line of the infected email? Was it … A.) “URGENT,” B.) “ILOVEYOU,” C.) “MONEY4YOU” or D.) “HOT PICS”?
Hackers can take control of your car – How to protect yourself
The right software can turn your smartphone into a spy device that watches everything you do. Scary, I know. Here’s how to check if your phone is infected. While at it, check your computer. These are the signs that stalkerware is hard at work tracking your web activity, searches and even the passwords you type in.
Shockingly, your car isn’t immune. With the proper electronics and software techniques, a determined hacker can intercept or block your key fob signal, infiltrate your car’s software and even remotely control your vehicle.
So, is your connected car hackable? Most likely, yes. Here’s how.
Software hacks
Compromised car apps
Does your car have a smartphone app that allows you to unlock and start it remotely? Almost every car manufacturer offers this convenience in some makes and models.
Account usernames and passwords protect these apps. If hackers can break into your account or exploit a bug in the car’s software, they can compromise your entire vehicle.
My advice: To protect your remote start app, change the default password, use strong and unique credentials and never reuse passwords from other services. Enable two-factor authentication if you can, and keep that software current.
Telematics exploits
Telematics is the term describing a connected system remotely monitoring your vehicle’s behavior. This data may include your car’s location, speed, mileage, tire pressure, fuel use, braking, engine/battery status and driver behavior.
By now, you know anything connected to the internet is vulnerable to exploitation. Hackers that intercept your connection can track and even control your vehicle remotely. Now that’s scary.
My advice: Before you get a car with built-in telematics, consult with your car dealer about cybersecurity measures they’re utilizing on connected vehicles. If you have a connected car, ensure its onboard software is always up-to-date.
Here’s what it looks like when a virus takes over your computer
A slow computer can turn you into a detective. You start investigating the clues, trying to find out what happened. You might even Google “How to tell if you have a virus” or “Warning signs your computer is infected.”
Check your phone! 24 apps that contain the dangerous Joker malware
Earlier last month, nasty malware was making the rounds, giving hackers access to all kinds of personal information. Called Joker, it was embedded into several Android apps and overwrote the operating system’s notifications.
This nasty trick scams victims of ransomware searching for help
Of all the kinds of malware that can affect your personal data and files, ransomware is among the worst. It’s not enough that your files get locked up and hidden from you, but the people behind the attack expect you to pay up if you ever hope to see them again!