<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How Safe are Connected Cars Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/how-safe-are-connected-cars/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/how-safe-are-connected-cars/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 24 Sep 2020 17:55:04 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>How Safe are Connected Cars Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/how-safe-are-connected-cars/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom number 047 How Safe are Connected Cars</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-number-047-how-safe-are-connected-cars/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 23:05:41 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Connected Cars]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[How Safe are Connected Cars]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2323</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 47. This week we&#8217;re going to talk about how safe are connected cars. I&#8217;m not going to talk about the scary stuff that you see in movies about hackers taking control of vehicles and crashing them and that. No. I&#8217;m going to talk about something much more mundane than that. Why&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-number-047-how-safe-are-connected-cars/">#WeekendWisdom number 047 How Safe are Connected Cars</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 47. This week we&#8217;re going to talk about how safe are connected cars.<span id="more-2323"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2323-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-047-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-047-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-047-lo.mp4</a></video></div>
<p>I&#8217;m not going to talk about the scary stuff that you see in movies about hackers taking control of vehicles and crashing them and that. No. I&#8217;m going to talk about something much more mundane than that.</p>
<h3>Why am I asking the question about how safe are connected cars?</h3>
<p>There are two stories that I&#8217;ve become aware of in recent times, which were quite similar though they were spaced many years apart.</p>
<h3>The never ending lease</h3>
<p>In <a href="https://krebsonsecurity.com/2020/02/when-your-used-car-is-a-little-too-mobile/" target="_blank" rel="noopener noreferrer">the first case</a>, there was a person who had leased a car from a particular manufacturer who had the car for a number years and then handed it back in 2016. Earlier this year (2020) they got a notification from that manufacturer about something to do with their car. And they thought &#8220;That was odd. I don&#8217;t own that car anymore.&#8221; So they thought they&#8217;d log into their online account for the car to see if their credentials were still valid. And they were.</p>
<p>They were able to see their car. Could see where it was located. They could turn on the engine. Could turn off the engine. They could open doors. Could lock the doors. So they still had access to their old car. <span style="text-decoration: underline; color: #ff0000;"><strong>Four</strong></span> years later!</p>
<h3>An unexpected long term rental</h3>
<p>Similarly <a href="https://arstechnica.com/information-technology/2019/10/five-months-after-returning-rental-car-man-still-has-remote-control/" target="_blank" rel="noopener noreferrer">another person late last year</a> had rented a car for a period of time and they noticed that the manufacturer of that car had an App. So they set up the App which just needed the VIN number of the car and they were able to control car for the period that they had it rented for. <span style="text-decoration: underline; color: #ff0000;"><strong>5 months</strong></span> later they still have access to the car and doing the same things. They could open doors, turn on the engine, etc. They notified the manufacturer about this but nothing had happened.</p>
<h3>What do you need to do?</h3>
<p>So if you&#8217;ve sold a car, traded in a car, gotten rid of a car, rented a car, make sure the damned thing gets reset. That nobody can gain access to your car after the fact.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-number-047-how-safe-are-connected-cars/">#WeekendWisdom number 047 How Safe are Connected Cars</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-047-lo.mp4" length="32291059" type="video/mp4" />

			</item>
	</channel>
</rss>
