Cybersecurity

Rental cars can be data thieves, warns FTC

The convenience of automotive IT systems that connect smartphones with onboard media players might not be worth the risk of data loss when it comes to rental cars, according to the Federal Trade Commission.

Lisa Weintraub Schifferle, an attorney in the FTC's Division of Consumer and Business Education, said that when you return the car, those connected systems might betray you. That's because your activities can leave a data trail for those who know where to look, she wrote in an Aug. 30 blog entry that was cross-posted by the U.S. Computer Emergency Readiness Team.

The car's GPS device can store the locations you visited, possibly including where you work and live. If you connect your smartphone to any of the systems in the vehicle, it could reveal your telephone number, call and message logs, contacts and text messages, she added.

If you connect to any system in a rented vehicle, you must proactively delete the data to keep it from being accessed by the next driver or by hackers, she said.

Schifferle also recommended charging a smartphone via an adapter rather than a rental car's USB port, which could automatically transfer your data to the onboard systems. And she advocated checking onboard screens for options to limit access to connected devices and deleting your devices from the list when you return the vehicle.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


Featured

  • Cybersecurity
    malware detection (Alexander Yakimov/Shutterstock.com)

    Microsoft targets copycat influence websites

    Microsoft went to court to take down websites it believes to be part of a foreign intelligence operation targeting conservative think tanks and the U.S. Senate.

  • Cybersecurity
    secure network

    FAA explores shifting its network to FISMA high

    The Federal Aviation Administration is exploring an upgrade to the information security categorization of IT systems as part of air traffic control modernization.

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.