Personal information leaks don’t just happen on phones and computers, they can also happen on cars.GM recently released a statement saying that about 140 accounts were stolen, many of which had point balances, and that after the hackers gained access to the accounts, the attackers exchanged the points for gift cards.After discovering the incident, Universal immediately disabled the feature.
It is reported that hackers obtained personal information of some users from GM's online mobile application, including name, email address, mailing address, name and phone number of the bound account, etc. At the same time, some users' points were also received due to the exchange of gifts. loss.
In this regard, the 360 Tianshu think tank security experts pointed out that the intelligent networked car is like a "big mobile phone" on four wheels, integrating a large number of cameras, radars, speedometers, navigators and other sensors, which can be used continuously. Collect various data inside and outside the car during the operation of the car, including vehicle data such as vehicle speed and mileage, user data such as the address book of drivers and passengers, travel trajectories, photos taken by cameras, environmental data such as maps and roads, as well as automatic driving and Control data such as usage and operation information of automatic calling, remote service, etc.The "big data" obtained by these sensors is stored locally in the vehicle and in the cloud, which is at risk of being stolen.Once data is leaked, user privacy will be exposed, and the leakage of road network data, navigation data, environmental images and other data involving important and sensitive areas may also endanger national security.
In fact, the leakage of user privacy caused by smart cars has occurred many times.Earlier, Musk publicly acknowledged that Tesla uses in-car cameras to monitor drivers, raising privacy concerns among users.A survey by 360 showed that 84.2% of people believed that intelligence should be standard in cars, and expressed their longing for smart cars.However, 61.1% of people also believe that smart cars collect driving data or violate personal privacy, 86.4% of people worry that the Internet of Vehicles will suffer from cyber attacks, and 83.8% of people think that hackers may be able to remotely control smart cars, which will bring security risks .
At present, more and more attention is paid to the safety of smart cars in China.In August last year, the Ministry of Industry and Information Technology issued the "Opinions on Strengthening the Access Management of Intelligent and Connected Vehicle Manufacturing Enterprises and Products", to strengthen the main responsibility of enterprises, and strengthen the management of automobile data security, network security, software upgrade, functional safety and expected functional safety; this year In March, the Ministry of Industry and Information Technology issued the "Guidelines for the Construction of the Internet of Vehicles Network Security and Data Security Standard System", which requires that on the basis of laws and regulations, the formation of a standard system for my country's automobile data security should be accelerated.
360 Tianshu think tank security experts believe that, on the one hand, car collection of user information should achieve "informed consent, minimum enough"; Possibly avoid hacking.
In order to escort the safety of smart cars and the security of users' personal information, 360 has launched a car safety guard product specially developed for intelligent connected cars, which can comprehensively improve the safety and fluency of the car-machine system and ensure the car owner's car and privacy security.In addition, the Internet of Vehicles security framework centered on the 360 cloud security brain can be based on security big data analysis, and use key capabilities such as threat intelligence subscriptions, knowledge bases, and security experts to empower car companies and improve their awareness of security threats. Detection and discovery capabilities.At the same time, relying on the local security brain to build the security infrastructure of car companies, improve the security detection and real-time detection of the Internet of Vehicles before and after the vehicle leaves the factory, so that threats can be sensed, visible, and traceable, thereby ensuring the safety of end users.