The owner of this used car shop confirmed

Solve china dataset issues with shared expertise and innovation.
Post Reply
rakhirhif8963
Posts: 542
Joined: Mon Dec 23, 2024 3:13 am

The owner of this used car shop confirmed

Post by rakhirhif8963 »

— But that’s not the most interesting part! We were able to recover data from used cars that were put up for auction. The data is stored unencrypted, and anyone who bought such a car and knows where to look can easily access it. According to the manufacturer, electric cars have special functions that their owners can use to protect their data. For example, they can roll back the on-board computers to factory settings, thereby deleting their personal information and setting the default settings. However, there is no automatic data deletion function, so electric cars that have been in an accident and then sold at auction often store all the data of their previous owners.

that the data of the previous owners and their settings are not reset before the sale of the cars.

Keep in mind that this is not science fiction. When selling your devices, be sure to reset them to factory settings! For example, used Tesla cars that have “survived” an accident and are sold at auctions store highly confidential information of their previous owners, including data from mobile devices connected to them and video recordings of the accident.

SealRelevant: increasing information security awareness of personnel
Valery Vasiliev | 04/04/2019
As Vyacheslav Borilin, head of the Kaspersky Automated iran whatsapp data Awareness program, noted, approximately 80% of information security incidents begin with human error. Unfortunately, employees remain the weakest link in the corporate information security system.

More than half of the participants in last year's international study by Kaspersky Lab agreed with this conclusion. The study, conducted by the company earlier this year, adds some interesting facts to the picture of the attitude of personnel toward information security.

For example, while 23% of companies do not develop rules for employees to securely store official data, 60% of personnel store confidential information (financial data, email databases, etc.) on their work computing devices. Of course, without the necessary instructions, they do this at their own discretion.
Post Reply