Tech updates increasing vulnerability
When my old car finally quit, the only “special” thing I wanted in my new-to-me car was a CD player. Technology has come a long way in the past ten years, but I still have the car with the CD player. However, I also use a FM transmitter to play my iPhone through the speakers. Newer cars come with a whole host of features aimed at keeping us safer and simplifying our lives through Bluetooth, Wi-Fi, and more, but do the vulnerabilities and risks of these features, outweigh the rewards?
The FBI weighs in
The FBI along with the National Highway Traffic Safety Administration, have issued a safety bulletin addressing concerns that vehicles are being targeted more and more by hackers. While the latest issues of this have been resolved, they do want to make consumers and manufacturers aware of the potential problems. They stated in the bulletin: “The FBI and NHTSA are warning the general public and manufacturers of vehicles, vehicle components, and aftermarket devices to maintain awareness of potential issues and cybersecurity threats related to connected vehicle technologies in modern vehicles.”
Where are the vulnerabilities?
You may have heard about one of the more recent issues concerning the testing of the radio module. In August of 2015, a study [PDF] was published regarding researchers testing, targeting, and exploiting this particular device through attacking the vehicle through Wi-Fi and cellular connections. The radio module contained multiple wireless communication and entertainment functions and was connected to two controller area network (CAN) buses in the vehicle. Through their testing, researchers were able to shutdown the engine, disable the brakes and steering, trigger the door locks and turn signals, manipulate the tachometer, radio, HVAC, and GPS.
Vulnerabilities may exist within a vehicle’s wireless communication functions, within a mobile device – such as a cellular phone or tablet connected to the vehicle via USB, Bluetooth, or Wi-Fi – or within a third-party device connected through a vehicle diagnostic port. In these cases, it may be possible for an attacker to remotely exploit these vulnerabilities and gain access to the vehicle’s controller network or to data stored on the vehicle. Although vulnerabilities may not always result in an attacker being able to access all parts of the system, the safety risk to consumers could increase significantly if the access involves the ability to manipulate critical vehicle control systems.
Worried? Here’s 5 ways to minimize the chances of being hacked
1. Ensure your vehicle software is up to date: If your manufacturer issues a notification to update, it’s important that you do, but, verify that the update is genuine. Verify any recall or update notices by visiting your car’s manufacturer website. Clicking through emailed links presents the opportunity for hackers to send malicious links. Also, be wary of receiving USB and SD cards via the mail. Hackers could use this method to introduce malicious software into your car. Instead, check on your vehicle’s manufacturer’s website to identify the latest software updates. Use your own USB or SD card where necessary to download and transfer information. You can always check with your dealer or manufacturer before updating.
2. Be careful when making any modifications to vehicle software: Unauthorized updates could create increased vulnerabilities and change the way your car works.
3. Maintain awareness and exercise discretion when connecting third-party devices to your vehicle: Most modern vehicles have a standardized diagnostic port (OBD-II), which provides connectivity to the in-vehicle communication. Keeping these third-party devices secure is critical as a hacker may target them remotely as a way into your other systems. Do not connect any unknown or untrusted devices to the OBD-II port.
4. Be aware of who has physical access to the vehicle: Treat your vehicle the same way you do an unlocked smartphone, or computer: you don’t let people you don’t know touch it. Be cautious of who you leave your vehicle with; it only takes a few moments to upload hacking software.
Improving cyber security
While there are risks with using any technology, you want to be especially mindful of your automotive technology. The last thing anyone wants is to lose control of your vehicle. While the chances of this are minimal, you can decrease them even further by being actively aware of whom you leave your car with, your surroundings, and your technology system.
The rewards of technology outweigh the risks, especially when you consider the increased safety benefits of advanced technology; however, there is always a chance someone will turn this technology to their advantage. The NHTSA is actively working on initiatives to improve cyber security in vehicles.
To increase your security, please, follow the FBI’s tips above, or you can reach out to local law enforcement and the FBI with questions and concerns via the Internet Crime Complaint Center, or file a complaint with them.
Infinity Maps is the most mind-blowing visual workspace ever
(TECHNOLOGY) Infinity Maps is bringing together whiteboarding, diagramming, and real-time collaboration all in one neat tool.
Digital tools should be effective and efficient. They should help you plan, create, and manage your projects so your team can build solutions to your overall goals. While many tools say they are the all-in-one tool solution, this is a pretty bold statement to make. Each company is different, and one size doesn’t necessarily fit all.
However, there comes a time when such a tool comes slightly close to filling that spot. Infinity Maps seeks to do this by marrying some of the best qualities of different tools and adding its spice to the mix.
What does Infinity Maps offer?
The web application is partially an online whiteboard tool. In your workspace, called Canvas, you create your content by using cards. In these cards, you can add text, images, and files. Cards can be nested indefinitely creating hierarchies while still maintaining a “clear and concise” structure. You can do this by simply dragging a card into another card.
To visualize how each card correlates to one another, you have the option to link cards with arrows. These arrows are further organized by changing the color of each one or changing the color of the card itself.
Infinity Maps lets your team collaborate in real-time. To work together, you can invite users to your map. When you share your workspace, you assign people different roles so they have the correct permissions to read or write on your map. Like Google’s web tools, you can see who is using the map because each username will show up next to their cursor and be assigned a different color.
Navigating through Infinity Maps is easy and works just like Google Maps. By double-clicking, you are taken directly to the card you selected. You can also scroll up and down and use the trackpad to zoom in and out of your map. This feature is super helpful when you have hundreds of cards on your map.
Why Infinity Maps?
The company says Infinity Maps is a “revolutionary new product that allows you to organize vast amounts of information visually & spatially”. It is a combination of Miro, Notion, and Google Maps all into one.
“What are we doing differently?” asks Infinity Maps CEO & Co-Founder Johannes Grenzemann. “With Infinity Maps, we are building a knowledge management system that allows you to create vast, huge knowledge bases [that] depict high complexity and depth while staying mind friendly because it’s a visual approach,” Grenzemann said.
Overall, Infinity Maps is a neat knowledge tool. It can be used in several ways, from students trying to organize their thesis to startups managing their product launches.
If you’re interested in checking them out to see if they are indeed the all-in-one tool solution, you can sign up to start mapping. A free account gives you access to 3 maps, up to 150 cards per map, and 50MB of cloud space. If you need more space to map out your ideas, you can unlock additional cards by inviting a friend or purchasing cards. Pro, unlimited, and team subscriptions plans are also available for purchase.
China cracks down on user data collection, allegedly cares about privacy
(TECH) Either China’s government just grew a conscience, or they’re trying to compete on a global stage. Either way, they’re implementing new laws.
In an uncharacteristic looking move for end-user privacy and choice, China has passed sweeping new legislation entitled the Personal Information Protection Law. It’s set to take effect on November 1, 2021, and includes provisions governing consent in user data collection of tech applications and specifies how companies can use that data, especially if that data is to be transferred out of China.
This is the second of two pieces of legislation to emerge this year as China takes a hard look at their cyberspace and try their hand at oversight.
The Data Security law, which came into effect on Sept. 1, set classification frameworks for data based on “its economic value and relevance to China’s national security” as cited in Reuters.
According to experts, both laws will require companies to reevaluate how they collect and store data on a massive scale. As regulations continue to develop rapidly during China’s re-examination of their tech industry, companies are scrambling to meet the stringent new requirements and adjust their infrastructure for compliance at a break-neck pace.
- The Personal Information Protection Law similar in design to Europe’s General Data Protection Regulation
- China’s top cyberspace regulator, Cyberspace Administration of China (CAC), issued an investigation into Didi Global Inc, their version of Uber, with accusations of user privacy violations
- An extensive set of rules targeting business practices that undermine fair competition, such as cultivating reviews, were implemented by China’s State Administration for Market Regulation (SAMR)
- 43 apps were accused of illegally transferring user data and called out by the Ministry of Industry and Information Technology and required to make “rectifications”
Similar cyberspace scrutiny is happening in the US regarding monopolies held by some of the biggest players in tech like Google, Facebook, and Amazon but is moving very slowly through the legislative process.
In terms of how this impacts Americans, TikTok is currently one of the single most downloaded apps in the US and owned by Beijing-based company ByteDance. According to The Sun, ByteDance is now the most valuable startup in the world with an estimated value of 1 billion USD.
Many doubt that China actually cares about privacy, but some believe that keeping up the appearance of playing by modern corporate rules benefits their government as they seek global dominance.
Apparently, the chip shortage is NOT easing up this year…
(TECH NEWS) If you’re a tech person who has tried to buy anything with a chip in it, you know there’s been a shortage and therefore a buying frenzy. Which apparently isn’t ending soon.
It appears that the chip shortage, a phenomenon that has plagued production for the last six or so months, is not easing up like people had initially predicted. The real-world effects of this shortage are varied, but impactful.
The Daily Brew’s Dan McCarthy reports that the average wait time for chip deliveries is up to over 20 weeks at this point, a number that (despite postulation that the second half of 2021 would see increased chip production) is higher than the wait times in both July and June of this year.
The chip shortage has a few different roots, but the primary one as of late is a slew of COVID-19 outbreaks in Southeast Asia – specifically near locations that produce large numbers of semiconductors for the rest of the world. It’s thought that the wait time will increase in the coming weeks, even as companies slash predictions and hunker down for a hit to their profits this season.
For context, manufacturers were having to wait for a little over 12 weeks for their semiconductors this time last year. It’s clear that we’re going in the wrong direction if we’re planning to keep up production going into this next year.
The implications of such a shortage range from baffling to sobering. Earlier this year, people struggled to find PS5s for reasonable prices; more importantly, though, is the effect this shortage is having on the automobile industry. A couple of weeks ago, Toyota announced a 40 percent cut in production plans for September.
With GM, Ford, Stellantis, and VW adding that they will most likely cut back on production as well, it looks like the 2022 vehicle market will be the latest casualty to lower-than-optimal supply in a time of moderate demand.
While the chips used in cars, appliances, and other common electronics are profoundly affected by the shortage, it appears that “power management” chips (the ones used in smaller devices, namely smartphones) have a decreased wait time from last month. This somewhat contradicts a shortage warning by Apple in late July, though we’re clearly not out of the woods regarding production efficiency yet.
It is extremely likely that this shortage will impact auto and appliance production in 2022.
Business Entrepreneur1 week ago
6 entrepreneurial tools to keep startup productivity high
Opinion Editorials1 week ago
Why tech talent is in the process of abandoning Austin
Business Entrepreneur14 hours ago
‘Small’ business was once a stigma, but is now a growing point of pride
Opinion Editorials19 hours ago
Minimalism doesn’t have to happen overnight
Business Entrepreneur17 hours ago
Why and how to acquire a business – 4 tips for radical success
Business Entrepreneur1 week ago
Here’s why you shouldn’t start that startup
Opinion Editorials1 week ago
Why robots freak us out, and what it means for the future of AI
Business Marketing1 week ago
7 Low-budget marketing ideas for small businesses [sponsored]