Navigating complex data privacy terrain
Imagine returning late one night from a business trip and walking across the airport parking lot to your car to drive home. You press the remote keyless-entry fob to unlock and start the vehicle. Strapped in and cellphone plugged into the charger, you’re on your way. Or not. A routine drive home is impossible now that a hacker has deployed “gridlockware” to your vehicle, rendering it inoperable. You are stranded, unless you follow instructions and pay ransom. Don’t believe this could happen? A 2019 Georgia Tech study proved the likelihood only on a much larger scale with devices known as “code grabbers” that copy or intercept the signals used to remotely open and start vehicles.