Intelligent CIO Europe Issue 14 | Page 24

TRENDING access. Criminals use a relay system to access the vehicle by amplifying a key signal from inside a property so that it reaches the car on the driveway. A total of 19% of drivers already disable their keys when not in use, by either placing them into a secure holder such as a microwave or a Faraday cage to block the signal. Additional security weak spots include: • Phone phishing for car access – Most people are aware of phishing scams in general, but what’s less widely known is that hackers can email you malicious links that then connect to a car’s Wi-Fi features if it has them, and take control • Local remote-control apps – There are a number of car tracking apps on the market that allow users to locate, start and control their cars from their phones. 24 INTELLIGENTCIO While these can be handy for those with Internet-connected cars, they also open the users up to hackers who have proved they can manipulate the system to locate, unlock and even cut out the engine of nearby cars on the system remotely • Tyre pressure monitor systems – Using low-cost, readily available equipment, hackers can use sensors inside a vehicle’s tyres to display false tyre pressure readings – and more worryingly, track the car Driver concerns Despite the risks, 13% of drivers are still excited about cars with automation, Wi-Fi hotspots and biometric access. However, 22% are more wary and consider this new technology to be a security threat. And it seems those who were concerned may be right to be worried – 16% of drivers or “ SOMETIMES AN OLD-FASHIONED SECURITY METHOD SUCH AS A STEERING LOCK, CAN BE ALL THAT’S NEEDED TO PROTECT AGAINST CRIMINALS. www.intelligentcio.com