For many drivers, getting in the car follows a routine: Use a key fob to unlock the car door, get into the driver’s seat, connect a smartphone to the car’s infotainment system, and then drive off. Yet, when we asked drivers in a quiz addressing connected-car security, many failed to identify the best ways they could protect their data and their vehicles. Here’s where they fell short:(more…)
As a teenager, I drove a 1984 Honda Accord. It was charcoal gray, just like every other 1984 Accord in existence.
On more than one occasion I remember walking up to the wrong one, even putting my hand on the door handle, before realizing it wasn’t my car. For me, the first indication that it wasn’t mine was the lack of a wet towel jammed between the leaky sunroof and the headliner to prevent rainwater from dousing my head.
While it would’ve been nice to drive away in a car with leak-proof roof, I never did steal anyone’s car in place of mine.
Many years later my mom drove a 2012 Subaru. She parked at a grocery store, but came back to the wrong car and actually sat down inside and tried to start it before realizing she’d made a mistake.
A funny story out of the New York Post tells the tale of a mother who actually succeeded in an accidental theft, which makes me wonder just how often things like this happen.
The following thoughts are occasioned by a recent trip to Boston, during which I drove my nephew’s Mazda CX-9. Beautiful car, with all the goodies, including keyless entry and auto-start. My first thought was how hackable that thing was.
Hacking keyless entry to unlock and start cars has become all the rage, even in Africa. A rash of car thefts in Rustenburg, S.A., was caused by thieves using “a universal remote available on the black market that allegedly opens about 50% of the latest cars available on the market.”
The more sophisticated keyless car systems get, the more vulnerabilities they seem to offer. Bad boys can hack your smartphone pretty easily, and Apple’s voice-command Siri can be hacked to start your car with a proxy server. Media players are now a target:
Earlier this year, researchers from the University of California, San Diego and the University of Washington hid a Trojan on a CD, which, once inserted into the stereo, gave them access to the vehicle’s full computer system. And this past summer, researchers at the Black Hat Security Conference demonstrated a proof-of-concept hack in which they hacked into a car’s security system using a text message.