Security researchers have identified old Tesla car parts for sale on eBay with personal data of previous owners and has created some controversy among the Tesla’s customer privacy. GreenTheOnly, a white hat hacker had mentioned that the media control units (MCUs) and an autopilot hardware that were switched in the old models of Tesla vehicles are now being sold online.
These parts contained previous owners personal data like address, WiFI usernames and passwords, calendar data, call logs, and mobile contact book data that had been paired with the car, along with Netflix and other session cookies that have been accessed earlier through those components.
Tesla upgrades car components when requested and the old components are taken back by Tesla and is not allowed to remain with the car owners.
On the contradictory, this discovery by the white hat shows that the techs are selling the withdrawn old components online, or according to InsideEVs, black hats are leveraging a random Tesla warehouse or service centers for the details.
Tesla has not responded yet to the discovery, and has not denied the same until this article was published. However, the techs have been advised by the firm to crush the old components before disposing of them as a junk. Meanwhile, Tesla is yet to notify its customers about this data breach, however it is better for the previous owners to update passwords of any accounts that have been paired or linked to the car.
However, considering the California Consumer Privacy Act (CCPA) is in force, and after Tesla data breach, the company may be asked to prove their innocence or penalized for their negligence of personal data protection and security. Furthermore, with the development in the automotive sector, more components and devices do have access to computerized data.
Any information that is stored in a computerized format, can be equally stored in devices that are involved with the operation. Advanced car manufacturing companies like Tesla and others need to ensure they have proper data protection lifecycle in place to ensure no stone is left unturned. Also, this Tesla data breach case is a wonderful example of non-intentional insider threat vector.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…
View Comments
Hey guys, I just wanted to see if you need anything in the way of site editing/code fixing/programming, unique blog post material, extra traffic by getting others to start sharing your site across their own social media accounts, social media management, optimizing the site, monitizing the site, etc. I have quite a few ways I can set all of this and do this for you. Don't mean to impose, was just curious, I've been doing this for some time and was just curious if you needed an extra hand. I can even do Wordpress and other related tasks (you name it).
Stay Safe,
Winston
1.708.320.3171
If you want to use the photo it would also be good to check with the artist beforehand in case it is subject to copyright. Best wishes. Aaren Reggis Sela
Hello. This article was really remarkable, particularly since I was looking for thoughts on this topic last Thursday. Dawna Wyatt Primalia
Way cool! Some very valid points! I appreciate you penning this article and also the rest of the site is extremely good. Sarine Jase Essam
Way cool! Some very valid points! I appreciate you penning this write-up plus the rest of the site is extremely good. Blisse Leeland Derian
Hey just wanted to give you a quick heads up. The words in your content seem to be running off the screen in Ie. Carita Miguel Fried
If you want to use the photo it would also be good to check with the artist beforehand in case it is subject to copyright. Best wishes. Aaren Reggis Sela
Hi there, after reading this awesome post i am also cheerful to share my familiarity here with mates. Ada Rudy Jefferson
Really appreciate you sharing this blog post. Really looking forward to read more. Really Great. Andrea Etan Giess
No matter if some one searches for his required thing, thus he/she desires to be available that in detail, so that thing is maintained over here. Britney Callean Macegan