www.malwarebytes.com
Open in
urlscan Pro
192.0.66.233
Public Scan
Submitted URL: https://clicks.malwarebytes.com/u/click?_t=24fabbbc5c2c43578ed8469e4f452569&_m=895b7b2441c84e80aff65fe1677f0416&_e=cmSAe_JXkGZ5p...
Effective URL: https://www.malwarebytes.com/blog/news/2024/07/us-senators-ask-ftc-to-investigate-car-makers-privacy-practices?utm_source=ite...
Submission: On August 06 via manual from US — Scanned from CA
Effective URL: https://www.malwarebytes.com/blog/news/2024/07/us-senators-ask-ftc-to-investigate-car-makers-privacy-practices?utm_source=ite...
Submission: On August 06 via manual from US — Scanned from CA
Form analysis
5 forms found in the DOMGET https://www.malwarebytes.com/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Type to search..." value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://www.malwarebytes.com/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Type to search..." value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
GET https://www.malwarebytes.com/blog/
<form role="search" method="get" class="search-form" action="https://www.malwarebytes.com/blog/">
<div class="labs-sub-nav__searchbar-wrap">
<input class="labs-sub-nav__search-input" type="text" name="s" placeholder="Search Labs">
<button class="labs-sub-nav__search-button" id="cta-labs-rightrail-search-submit-en" aria-label="Search in Malwarebytes">
<svg xmlns="http://www.w3.org/2000/svg" width="35px" height="35px" viewBox="0 0 24 24" fill="none">
<g clip-path="url(#clip0_15_152)">
<rect width="24" height="24" fill="none"></rect>
<circle cx="10.5" cy="10.5" r="6.5" stroke="#0d3ecc" stroke-linejoin="round"></circle>
<path d="M19.6464 20.3536C19.8417 20.5488 20.1583 20.5488 20.3536 20.3536C20.5488 20.1583 20.5488 19.8417 20.3536 19.6464L19.6464 20.3536ZM20.3536 19.6464L15.3536 14.6464L14.6464 15.3536L19.6464 20.3536L20.3536 19.6464Z" fill="#0d3ecc">
</path>
</g>
<defs>
<clipPath id="clip0_15_152">
<rect width="24" height="24" fill="#0d3ecc"></rect>
</clipPath>
</defs>
</svg>
</button>
</div>
</form>
GET https://www.malwarebytes.com/digital-footprint-app
<form style="margin-bottom: 32px; border-radius: 1em; padding: 24px 16px; background-color: #18181a; background-image: radial-gradient(#525252 1.5px,transparent 0); background-size: 20px 20px;" id="form" method="GET"
action="https://www.malwarebytes.com/digital-footprint-app" target="_blank" __bizdiag="96619420" __biza="WJ__" vwo-element-id="1713202132545" vwo-op-1713202348479="">
<h2 style="margin: 0 8px 0 8px; color: #fff; font-family: Poppins,sans-serif; font-size: 24px; margin-bottom: 24px" class="vwo_1712655349804 vwo_1712757835977" dir="ltr"> <img class="mb-logo"
src="https://www.malwarebytes.com/wp-content/themes/malwarebytes/assets/src/digital-footprint/dist/assets/mb-logo.svg" alt="malwarebytes logo" style="height: 18px"> <br>Digital Footprint Portal </h2>
<p style="color: #fff; margin-left: 8px; margin-right: 8px" class="vwo_1712654910657 vwo_1712655348228 vwo_1712655373236">Enter your email to see if your personal data has been exposed. </p>
<div style="display: flex; justify-content: flex-end; flex-wrap: wrap;" class="vwo_1712617537229">
<div style="margin: 0 8px 16px 8px; flex-grow: 1; display: flex; padding: 24px 20px; align-items: center; gap: 12px; border-radius: 28px; border: 1px solid #fff; box-shadow: 0 1px 2px #0d10170f; height: 20px; background-color: #18181a;"
class="vwo_1712616680831 vwo_1712616818681 vwo_1712655073123"> <img
src="data:image/svg+xml,%3csvg%20width='20'%20height='20'%20viewBox='0%200%2020%2020'%20fill='none'%20xmlns='http://www.w3.org/2000/svg'%3e%3cpath%20d='M2.7978%203.49805H17.1978C18.1878%203.49805%2018.9978%204.25945%2018.9978%205.19004V15.342C18.9978%2016.2726%2018.1878%2017.034%2017.1978%2017.034H2.7978C1.8078%2017.034%200.997803%2016.2726%200.997803%2015.342V5.19004C0.997803%204.25945%201.8078%203.49805%202.7978%203.49805Z'%20stroke='white'%20stroke-linecap='round'%20stroke-linejoin='round'/%3e%3cpath%20d='M18.9978%205.18848L9.99779%2011.1105L0.997803%205.18848'%20stroke='white'%20stroke-linecap='round'%20stroke-linejoin='round'/%3e%3c/svg%3e"
alt="email icon"> <input style="margin: 0; width: 100%; background-color: #18181a; border: none; outline: none; color: #fff; font-size: 20px; font-style: normal; font-weight: 300; line-height: 24px;" type="email" name="email"
autocomplete="off" placeholder="name@email.com" class="vwo_1712616897633 vwo_1712660000524"> </div> <input type="submit" value="Scan"
style="margin: 0 8px 0 8px; background: #0d3ecc; color: #fff; border: none; height: 50px; border-radius: 100px; padding: 14px 40px" class="vwo_1712660005400">
</div>
</form>
https://www.malwarebytes.com/newsletter/
<form action="https://www.malwarebytes.com/newsletter/" class="newsletter-form">
<div class="newsletter-form__inline">
<label>Email Address</label>
<input type="email" name="email" id="cta-footer-newsletter-input-email-en" placeholder="Email Address" required="" class="newsletter-form__email">
<input type="hidden" class="newsletter-form__pageurl" value="https://www.malwarebytes.com/blog/news/2024/07/us-senators-ask-ftc-to-investigate-car-makers-privacy-practices">
<input name="source" type="hidden" value="">
<input type="submit" value="Sign Up" class="newsletter-form__btn" id="cta-footer-newsletter-subscribe-email-en">
</div>
<div class="newsletter-form__validate hidden">
<span></span>
</div>
</form>
Text Content
Skip to content Search Search Malwarebytes.com Search for: * Sign In * MyAccount sign in: manage your personal or Teams subscription > * Cloud Console sign in: manage your cloud business products > * Partner Portal sign in: management for Resellers and MSPs > * Personal < Personal Products * Malwarebytes Premium Security > * Malwarebytes Privacy VPN > * Malwarebytes Identity Theft Protection > * Malwarebytes Browser Guard > * Malwarebytes for Teams/small offices > * AdwCleaner for Windows > -------------------------------------------------------------------------------- Find the right product See our plans Infected already? Clean your device now Solutions * Free antivirus > * Free virus scan & removal > * Windows antivirus > * Mac antivirus > * Android antivirus > * iOS security > * Digital Footprint Scan > See personal pricing Manage your subscription Visit our support page * Business < Business BUNDLES * ThreatDown Bundles * Protect your endpoints with powerfully simple and cost-effective bundles * Education Bundles * Secure your students and institution against cyberattacks TECHNOLOGY HIGHLIGHTS * Managed Detection & Response (MDR) * Deploy fully-managed threat monitoring, investigation, and remediation * Endpoint Detection & Response (EDR) * Prevent more attacks with security that catches what others miss * Explore our portfolio > Visualize and optimize your security posture in just minutes. Learn more about Security Advisor (available in every bundle). > * Pricing < Pricing Personal pricing Protect your personal devices and data Small office/home office pricing Protect your team’s devices and data Business pricing (5+ employees) Step up your corporate endpoint security. Save up to 45% * Partners < Partners Explore Partnerships Partner Solutions * Resellers * Managed Service Providers * Computer Repair * Technology Partners * Affiliate Partners Contact Us * Resources < Resources Learn About Cybersecurity * Antivirus * Malware * Ransomware Malwarebytes Labs – Blog * Glossary * Threat Center Business Resources * Reviews * Analyst Reports * Case Studies Press & News Reports The State of Malware 2023 Report Read report * Support < Support Malwarebytes Personal Support Malwarebytes and Teams Customers ThreatDown Business Support Nebula and Oneview Customers Community Forums Free Download * Sign In * < Sign In * MyAccount sign in: manage your personal or Teams subscription > * Cloud Console sign in: manage your cloud business products > * Partner Portal sign in: management for Resellers and MSPs > Search Search Search Malwarebytes.com Search for: SUBSCRIBE rss News | Privacy US SENATORS ASK FTC TO INVESTIGATE CAR MAKERS’ PRIVACY PRACTICES Posted: July 29, 2024 by Pieter Arntz DIGITAL FOOTPRINT PORTAL Enter your email to see if your personal data has been exposed. An ongoing US Senate investigation indicated that connected car makers violate consumer privacy by sharing and selling drivers’ data, including their location, on a vast scale, and that the same car makers often obtain consumer consent through deception. Based on this investigation, senators have urged the Federal Trade Commission (FTC) to investigate automakers’ disclosure of millions of Americans’ driving data to data brokers, and to share new-found details about the practice. And they don’t stop there: > “If the FTC determines that these companies violated the law, we urge you to > hold the companies and their senior executives responsible.” At Malwarebytes, we reported how a team of researchers at Mozilla who reviewed the privacy and data collection policies of various product categories for several years now, named “Privacy Not Included,” found cars to be the worst product category they ever reviewed for privacy. A modern car hasn’t just been a transportation vehicle for a long time. With multiple digital systems, they are increasingly plugged into web applications and digital processes—applications and processes that are vulnerable to security flaws. But at least those vulnerabilities are not intentional. Some other privacy issues are. In November 2023, a judge ruled it’s fine for car makers to intercept your text messages, because the practice doesn’t meet the threshold for an illegal privacy violation under state law. The senators found some worrying aspects of modern car data collection practices, which included the use of dark patterns to obtain consent in ways that did not qualify as “informed” consent. Dark patterns, also known as deceptive design patterns, occur when a user interface has been carefully crafted to nudge or trick users into doing things they didn’t set out to do. Another problem lies in the fact that data was found to be sold on to data brokers. These services can allow interested parties—from law enforcement agencies to marketing firms and even scammers—to access records that contain usernames, passwords (including in clear text), email addresses, IP addresses, and more. Three car makers confirmed their disclosure of drivers’ data to one data broker, such as acceleration and braking data. One of the car makers also confirmed that it disclosed customer location data to two other companies, which it refused to name. The named data broker sold these reports to auto insurance companies and also provided automakers with some of this information, including a driving score and safe driving suggestions. According to the New York Times, car manufacturers shared driving behavior data from more than eight million cars. The senators also worry that some car makers may have gone as far as exclusively advertising “safe driving” programs as a way to lower their insurance bills, without revealing that some insurers might charge some drivers more based on their telematics data. Some states—including Louisiana and Montana—limited the use of telematics data to raise insurance premiums, while California only permits telematics data sharing for mileage verification. The senators requested that: > “The FTC should hold accountable the automakers, which shared their customers’ > data with data brokers without obtaining informed consent, as well as the data > brokers, which resold data that had not been obtained in a lawful manner. > Given the high number of consumers impacted, and the outrageous manipulation > of consumers using dark patterns, the FTC should also hold senior company > officials responsible for their flagrant abuse of their customers’ privacy.” At Malwarebytes, we have expressed our concerns about the number of buyers and brokers for data. That’s regardless of whether they are there to sell data to anyone that is willing to pay, or only offer it to those that rightfully own the data. It’s also regardless of how the data were obtained, in a breach or by “consent.” As we all learned in economics, demand drives up the price and the higher the price the more attractive it becomes to go after the data. And, as the mother-of-all-breaches (MOAB) incident clearly demonstrated, not everyone is as careful as they should be about accidentally exposing their data collection. CHECK YOUR EXPOSURE You can verify whether your information is available online due to data breaches by using the Malwarebytes Digital Footprint portal. Just enter your email address (try the one your car dealership has) to our free Digital Footprint scan, and we’ll give you a report. For those whose information was not included, you’ll still likely find other exposures in previous data breaches. SCAN NOW -------------------------------------------------------------------------------- We don’t just report on threats – we help safeguard your entire digital identity Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection. SHARE THIS ARTICLE RELATED ARTICLES Android | News ANDROID VULNERABILITY USED IN TARGETED ATTACKS PATCHED BY GOOGLE August 6, 2024 - Google has issued security updates for 46 vulnerabilities, including a patch for a remote code execution flaw which has been used in limited targeted attacks. CONTINUE READING 0 Comments News | Privacy MEN REPORT MORE PRESSURE AND THREATS TO SHARE LOCATION AND ACCOUNTS WITH PARTNERS, RESEARCH SHOWS August 6, 2024 - Men face more pressure—and threats—from significant others to grant access to their personal devices, online accounts, and locations. CONTINUE READING 0 Comments News | Ransomware MAGNIBER RANSOMWARE TARGETS HOME USERS August 6, 2024 - Home users are being targeted by a ransomware called Magniber which locks up files and demands money for the key. CONTINUE READING 0 Comments News A WEEK IN SECURITY (JULY 29 – AUGUST 4) August 5, 2024 - A list of topics we covered in the week of July 29 to August 4 of 2024 CONTINUE READING 0 Comments News | Scams SCAMMERS ARE IMPERSONATING CRYPTOCURRENCY EXCHANGES, FBI WARNS August 2, 2024 - The FBI warns about scammers that impersonate employees of cryptocurrrency exchanges as a means to defraud victims CONTINUE READING 0 Comments ABOUT THE AUTHOR Pieter Arntz Malware Intelligence Researcher Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books. Contributors Threat Center Podcast Glossary Scams Cyberprotection for every one. FOR PERSONAL * Windows Antivirus * Mac Antivirus * Android Antivirus * Free Antivirus * VPN App (All Devices) * Malwarebytes for iOS * SEE ALL COMPANY * About Us * Contact Us * Careers * News and Press * Blog * Scholarship * Forums FOR BUSINESS * Small Businesses * Mid-size business * Larger Enterprise * Endpoint Protection * Endpoint Detection & Response (EDR) * Managed Detection & Response (MDR) FOR PARTNERS * Managed Service Provider (MSP) Program * Resellers MY ACCOUNT Sign In SOLUTIONS * Digital Footprint Scan * Rootkit Scanner * Trojan Scanner * Virus Scanner * Spyware Scanner * Password Generator * Anti Ransomware Protection ADDRESS One Albert Quay 2nd Floor Cork T12 X8N6 Ireland 3979 Freedom Circle 12th Floor Santa Clara, CA 95054 LEARN * Malware * Hacking * Phishing * Ransomware * Computer Virus * Antivirus * What is VPN? * Twitter * Facebook * LinkedIn * Youtube * Instagram CYBERSECURITY INFO YOU CAN’T LIVE WITHOUT Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats. Email Address * Legal * Privacy * Accessibility * Compliance Certificates * Vulnerability Disclosure * Terms of Service © 2024 All Rights Reserved PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Privacy Policy OK MANAGE CONSENT PREFERENCES ALL COOKIES Always Active * STRICTLY NECESSARY Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. * PERFORMANCE AND FUNCTIONALITY Always Active These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. * ANALYTICS Always Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. * ADVERTISING Always Active These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label OK