Connected Cars Are Rolling Spy Networks — And They Can Be Hacked

Connected Cars Are Rolling Spy Networks — And They Can Be Hacked

Author: Jim Love May 2, 2026 Duration: 44:51

Connected cars are no longer just vehicles — they are rolling networks of sensors, cameras, microphones, and constant data transmission.

In this Cybersecurity Today Weekend Edition, David Shipley is joined by former CSIS intelligence officer Neil Bisson and cybersecurity expert Federico Simonetti to break down what that really means.

They explain how modern vehicles:

Continuously report location, behaviour, and system data to the cloud
Contain dozens of interconnected computers controlling everything from steering to braking
Can be vulnerable to man-in-the-middle attacks, remote access, and system compromise
May expose drivers to surveillance — not just by companies, but potentially by nation states

The conversation goes beyond theory. Real-world examples are discussed, including:

Remote vehicle manipulation demonstrated by security researchers
How infotainment systems can become entry points to critical controls
Why some countries are already restricting certain vehicles from sensitive locations

The panel also tackles the bigger issue:
This is not just about one country or one manufacturer. Every connected vehicle expands the attack surface.

And while solutions exist — from better authentication to architectural changes — the challenge is no longer technical. It's political, economic, and global.

If you think your car is just transportation, this discussion may change your perspective.

00:00 Connected Cars: More Than Just Vehicles
01:20 Meet the Panel: Intelligence and Cybersecurity Perspectives
03:10 Every Car Is Now a Networked Computer
06:00 Surveillance Risks: Are Cars "Rolling Spy Vans"?
09:10 What Intelligence Agencies Can Do With Car Data
12:30 Sensors, GPS, Cameras — What Your Car Collects
16:20 Real Example: Tesla Camera Privacy Incident
19:00 Can Hackers Take Control of a Car?
22:30 Real-World Hacks: Jeep and Nissan Cases
26:40 The Regulatory Gap: No Enforced Cybersecurity Standards
30:10 Why Governments Are Struggling to Act
34:00 Cheap EVs vs National Security Risks
37:40 Can Software Fix the Problem?
41:20 Global Response: China, US, and Europe
45:10 Policy Ideas: Kill Switches, Car Bill of Rights
49:00 Prevention vs Detection in Cybersecurity
52:30 Are We Already Too Exposed?
55:10 Final Thoughts: Can Connected Cars Be Made Safe?


Every morning, Jim Love sifts through the noise of the digital world to bring you a clear, concise briefing on what actually matters. Cybersecurity Today isn't about fearmongering; it's about practical awareness. You'll hear straightforward analysis of the most recent attacks targeting companies, from sophisticated ransomware campaigns to stealthy data theft. Jim breaks down the implications of major breach disclosures, explaining not just what was stolen, but how it happened and who is affected. The focus remains on actionable intelligence-concrete steps and strategic thinking that can help protect your organization's data and infrastructure. This daily podcast serves as an essential filter for IT professionals, business leaders, and anyone responsible for digital assets, transforming complex threats into understandable insights. Tune in for a grounded perspective on navigating an online landscape where the risks are constantly evolving, and the need for clear, timely information has never been greater.
Author: Language: English Episodes: 100

Cybersecurity Today
Podcast Episodes
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day [not-audio_url] [/not-audio_url]

Duration: 14:01
Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cyb…
A Hacker Tells His Story [not-audio_url] [/not-audio_url]

Duration: 56:07
This is an interview with former hacker Brian Black. Brian is now on the right side of the battle and bringing his skills to to the fight against hackers. He finds the weaknesses in corporate security so that it can be p…
The Ransomware Ecosystem: An Encore Holiday Episode [not-audio_url] [/not-audio_url]

Duration: 1:15:54
Jim takes a break for some R&R during the holidays and shares his favorite podcast episodes from the year. He acknowledges that some listeners might have heard these episodes already, while others may find them new. The…
Year End Repeat: Pig Butchering: Operation Shamrock Fights Back [not-audio_url] [/not-audio_url]

Duration: 41:13
Over the holidays we are rerunning some of our favourite episodes. This one first aired this summer and was one of my first conversations with the fascinating head of Operation Shamrock. We'll be back with regular progra…
Arrests In 0365 Scheme: Cybersecurity Today With David Shipley [not-audio_url] [/not-audio_url]

Duration: 13:09
Global Cybercrime Crackdowns and Rising Threats This episode of 'Cybersecurity Today' hosted by David Shipley covers significant cybersecurity news. Nigerian police arrested three suspects linked to a Microsoft 365 phish…
Year-End Review: The Highs and Lows of Cybersecurity in 2025 [not-audio_url] [/not-audio_url]

Duration: 55:25
Cybersecurity Today brings you a special year-end episode, featuring noteworthy guests Tammy Harper from Flare, Laura Payne from White Tuque, David Shipley from Beauceron Security, and John Pinard, co-host of Project Syn…
On the Zero Day of Christmas - Cisco Devices Under Attack [not-audio_url] [/not-audio_url]

Duration: 10:35
Cybersecurity Today: Cisco Zero Day Exploited & Maritime Cyber Attack Unfolds In this episode of Cybersecurity Today, host David Shipley discusses a series of critical cybersecurity incidents, including the exploitation…