An unprecedented study published by the University of Texas, based in San Antonio in the United States, assessed the security of smart vehicles (and associated mobile applications) and spotted several possible attack scenarios against users. Indeed, most scooters rely on both the Bluetooth Low Energy technology and the smartphone’s Internet connection to function. The attacker is offered several options: for example, capture the data shared and launch man-in-the-middle or replay attacks, which allow the remote control of the vehicle. Physical attacks are another option: infiltrating malicious modules into the scooter’s battery, brakes or headlights can also enable remote control, or the manipulation of the trajectory displayed by the application’s map. In order to patch these vulnerabilities, the study recommends that the employees who charge the scooters check the security of the components, as well as the implementation of security by-design for related applications.