Survey finds 4 in 6 drivers are selling cars without wiping data


When the drivers are selling cars in the UK they are doing it without wiping their data synced from their mobile devices and this was revealed in a survey conducted by UK’s testing and research firm ‘Which?’.


Therefore all this leaked personal information can act as a treasure trove allowing hackers to download the private data related to Bluetooth, apps, and connected systems.


As we all know, when we are traveling in a car, we tend to use the infotainment system by connecting it with our smartphone device and syncing all the apps such as Contacts, Messages, email addresses, GPS locations, home addresses, music and videos to cater to our needs respectively.


Which? The consumer group found in its survey that over 14k drivers have sold their cars in the UK in the past two years and among them, 4 in 5 members failed to wipe out their details from the sold car for reasons before handing the car keys to the buyer.


Note 1- All car manufacturers offer instructions on how to delete the data from their car’s infotainment system in their official manuals which are available on a physical and virtual note via the web. So, why aren’t the car sellers following then…..?


Note 2- Some car companies like Toyota, Honda, and Volkswagen are offering apps that can help the user in tracking down their car’s location, unlock the doors, lock it from far, switch on the AC unit, and such. So, what if all this info leaks to the bad guys…?


Note 3- As per a survey conducted by uSwitch, Connected cars can collect anywhere around 26 GB to 32 GB data per hour. And as per their findings, a connected car uses over 150 million lines of code whereas a Boeing 787 jet just collects only 28% of the said lines of code. A line of code also called a Source line of code is a metric to measure the number of text lines constituting a program’s source code.


Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display