Vehicle Tracking Systems Target Cyber ​​Pirates

vehicle tracking systems target cyber hackers
vehicle tracking systems target cyber hackers

Vehicle tracking devices developed to prevent vehicle theft, because of the security gaps they have the target of hackers. Bitdefender Turkey Operations Director Flame Akkoyunlu can easily infiltrate hackers to employees indicating device with a remote command system, hackers can stop vehicles on the move and also draws attention to the car owners can also access the personal information.

Research shows that vehicle tracking devices make an important contribution to reducing vehicle theft. In countries where such devices are compulsory, the rate of vehicle theft is down to 40%. However, the system Bitdefender pointed out that ignore basic security practices for developers Turkey Operations Director Flame Akkoyunlu, hackers to track vehicles such devices, alarms are expressed can be used to disable or personal information to steal.

Hackers Infiltrate Vehicle Tracking Devices

Vehicle tracking systems are real zamIt comes with mobile applications that help it monitor its vehicles instantly. Pen Test Partners' security researchers tested the functionality and reliability of some vehicle tracking devices used across Europe. In the results they encountered, they found that they could not verify whether the commands given to the device came from a reliable source. Pointing out that hackers can infiltrate applications in the face of this situation, which can be used to affect thousands of vehicles, Alev Akkoyunlu points out that hackers can make a vehicle immobilized and restarting in the middle of traffic.

Stop Thousands of Vehicles Simultaneously

Vehicle tracking devices work with an external command principle. The commands from the vehicles must come from the vehicle owner or an authorized call center at the request of the police. However, a hacker who seeps commands into this system can stop all vehicles on the move using the same vehicle tracking device. To start the vehicle, the vehicle monitoring device must be physically removed.

Access Personal Information Through Devices

Customer identification information in vehicle tracking systems can be deciphered when hackers access the application. Hackers, who can change the e-mail address of any account registered in the application, can also initiate a password reset process by transmitting the details they have obtained to their own addresses. Noting that access to the vehicle can be accessed, all users can access the phone number and the authority to control all devices associated with the device, Alev Akkoyunlu said that the vehicles and users are real. zamHe states that hackers who monitor it instantly can cause more dangerous consequences.

Be the first to comment

Leave a response

Your email address will not be published.


*