Initially manufacturing companies the cars Greater attention to uncovering software weaknesses in modern cars, especially with reports of the ability or attempt of some information hackers to penetrate digital car systems, which, if it happens, will cause economic and human problems and disasters.
Two security researchers, Charlie Miller and Chris Valasik, had tried during the experiment of penetrating the Jeep Cherokee systems, years ago, remotely, and manipulating their settings by operating the air conditioner, opening and closing windows, and using windshield wipers with pumping wiper fluid to block See the driver.
This was a practical experience of how to exploit the weaknesses of this car, and during the experiment the car veered off the road; Due to the suspension of the throttle function, and here a state of fear arose among many about the ability of pirates to control the automated cars and interfere in driving operations, according to security expert Ray Walsh.
Walsh said: “It is expected that the likelihood of such attacks will increase with the arrival of more smart cars to the market, and that there is a very real risk of car hacks, as they may be used in secret assassinations.”
There are 4 ways that hackers can take control of your car, according to the technical website “aitnews”:
Car key clone
Vehicles with electronic opening systems are among the vehicles most vulnerable to this type of attack. Because the wireless transmitters are sold online, and allow hackers to easily clone the car key; Allowing them to be opened and operated.
So far, more than 100 models from 27 companies have been revealed that are at risk of this type of attack, and if the criminal manages to breach the keyless entry system, he can easily operate your vehicle and steal it.
Theft of your personal data
Hackers can steal and sell your personal information through your internet-connected car, and it is possible that any information that you download into your car’s system or your car app in the phone is vulnerable.
Some car rental companies have failed to delete the personal information that customers enter when renting cars into the integrated infotainment systems.
Control of the car’s driving system
Likely to arrive Pirates Remote control to the internal systems of your car, and this may mean that they can control everything inside the car, even control the driving system itself, such as: brake control, or increase the speed to the limit that exposes the driver to an accident.
USB port hacking
The (USB) port in your car represents a great danger according to the list of security vulnerabilities that can be exploited to penetrate cars, and even just listening to music through the port can infect your car system with malicious software; Because if your phone is hacked by any means, connecting it to a USB port gives hackers access to the car’s system.
– .