SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

CyberStory: How One User “Hacked” Google Maps to Fake a Traffic Jam

1 min read
in CyberStory

Google Maps is a navigation and traffic tool used by millions of people around the globe. And earlier this year, this widely-popular app was “hacked” when someone created virtual traffic jams using a wagon full of smartphones. Often, the maps change colors to reflect congestion or accidents, or if it gets bad enough, the app will even recommend alternative routes.

The more people are using Maps in one area, the worse the traffic potentially is. Simon Weckert took advantage of this, loaded 99 smartphones into a wagon, and opened the Google Maps app on all of them. As he walked down the street, Google recognized the high concentration of “users” and marked the street as having bad traffic.

Weckert even “drove” his wagon full of smartphones outside of Google’s Berlin offices to create the virtual traffic jam there. Google responded to the situation, saying that the company does indeed use a large number of devices running Maps in a single place as proof of a traffic jam and although the app has the ability to distinguish between cars and motorcycles, the company hasn’t quite cracked traveling by wagon. Hopefully, Google will continue to take measures to prevent this sort of thing from happening, as not doing so could leave the app open to being abused by someone with the right resources.

 

Related

Tags: Cyber ProfessionalsCyber StoryCybersecurityCyberstoryGoogle MapHackHackedTraffic Jam
11
VIEWS
ADVERTISEMENT

Related Posts

CyberStory: Teenagers

CyberStory: Teenagers

May 20, 2022
CyberStory: College Students

CyberStory: College Students

March 14, 2022
CyberStory: A 79-year-old victim of fraud

CyberStory: A 79-year-old victim of fraud

February 3, 2022
CyberStory: The Story of Alicia Kozakiewicz

CyberStory: The Story of Alicia Kozakiewicz

January 24, 2022

More Articles

Document

DEEPFAKE,CHEAPFAKE: THE INTERNET’S NEXT EARTHQUAKE?

December 2, 2020
Certification

CompTIA Security+

December 14, 2021

Spotify, PayPal, GitHub, and other major websites down due to Fastly CDN outage

June 8, 2021
Alerts

Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware

June 7, 2022
Incidents

NSO Group Spyware Found on State Department Phones

December 3, 2021

Neural Network model

December 3, 2020
Meme

Humor based on my pain

November 13, 2020
Alerts

Microsoft Azure Cosmos DB Guidance

August 27, 2021
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
    • Threats
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....