“You’re getting cars that are connected to the internet 24 hours a day. If cybercriminals targeted automobiles like they’re targeting other things we’d be in for a hard and fast ride.” Glad to see the seriousness of this threat is catching on as we have been talking about this for years – check out some of…
Search Results for: car
Automakers show more concern for hackers’ efforts to exploit vulnerabilities in car computer systems
Automakers seem to be taking the car hacking issue a lot more seriously. They should be. Over the last few years I have written quite a bit about car hacking and what laws may apply to such cases — such as the Computer Fraud and Abuse Act. Here is a post that references several of those…
Does Data Security Have Your Healthcare Practice “On the Hook”?
I recently had the pleasure of presenting in a webinar series titled Is Your Practice “On the Hook?” to members of the Texas Dental Association and the Oklahoma Dental Association. Key points of the presentation, which focused on cyber security and data breaches in the healthcare industry, explained why protected health information (PHI) and electronic healthcare…
Why do cyber criminals want your healthcare data?
During a recent presentation a member of the audience asked me why cyber criminals would want to steal a person’s healthcare data. It is easy to understand why they would want to steal payment card data — but healthcare data — not so obvious. Here is a great answer: A crook would love [healthcare data] because, “in the world…
A Hacker Can Takeover A Car Through Its Computer System — What About An Airplane?
Hackers can take over cars by hacking into their on board computer systems. Does it not stand to reason that they could do the same thing to an airplane? Maybe, maybe not, but a recent ruling by the FAA shows this was a concern for Boeing Model 777-200. May 18, 2015 Update: This post was…
You should know this > “What do connected cars and toilets have in common?”
What do connected cars and toilets have in common? That is the title to a recent Blog Post about an upcoming presentation at VMWorld 2013, Barcelona and, when I read it, I just had to quiz my readers to see who remembered … Come on now, you do know the answer to this question, right? I…
Hackers continue to exploit vulnerabilities in car computer systems
A couple of years ago I blogged about (what was then) the hypothetical question of whether hacking a car would violate the Computer Fraud and Abuse Act. Since that time we have seen the idea of hacking a car become a reality. I have written updated blog posts in shared a video showing how hackers…
Car Hacking Is Very Real and Can Be Very Deadly — Watch This Video Of How To Do It
It is really quite simple: Modern cars are controlled by computers — everything, from the accelerator to the brakes to the steering to the windows to the locks — take over the computer, you take complete control over the car. The idea of hacking a car is no longer fantasy. It is real. It can…
Social Media Evidence: Nightclub Promoter Tweets of Cowboys Players Drinking “Ace” Shortly Before Deadly Car Crash
When I give presentations on social media law, one of the topics I address is the use of social media as evidence in court cases. In the past I have usually used hypothetical examples to make my point of demonstrating how people’s penchant for saying really stupid things on Twitter, Facebook, Google+, etc. can be…
Hacking a car? Yes, really…and you thought I was kidding!
A few weeks ago I blogged about whether an unauthorized access of a car that has a computer and is connected to the Internet would violate the Computer Fraud and Abuse Act. Did you read it? Or, did you think it sounded too ridiculous? Here it is if you want to take a look: Can…
You must be logged in to post a comment.