The more personal data we enter on the internet and the more connected we are, whether we are at home, mobile or in the car, the more likely we are to fall victim to some form of cybercrime or cyberattack.
Major technological advancements in the automotive sector come almost simultaneously with cybercriminals. The more connected we are, whether we are at home, mobile or in the car, the more likely we are to be victims of some form of cybercrime or cyberattack. Now they are called ‘crackers’ and can even remotely change a vehicle’s software, according to the General Directorate of Traffic (DGT). But the occurrence of computer criminals with the car or the motorcycle is not new. As early as 2010, a team of researchers from the Universities of Seattle and California (USA) showed that the latest generation of cars was vulnerable to cyber-attacks and managed to hack into two vehicles that switched off the brakes and the engine remotely and while on the move. . The attacks multiplied until in 2018 the FBI warned manufacturers that they were in the crosshairs of the “crackers.”
And just a few weeks ago called a cybercriminal
david columbo He warned the world that he was in control of 25 Tesla electric cars in 13 different countries due to a mistake by the owners and without their knowledge of the attack. A disturbing urge that has kept Interpol wary, which states on its website: “Cyber crime is growing at a very rapid rate. They operate on a planetary scale and coordinate attacks in a matter of minutes.”
However, component manufacturers have been working for years and the UN has already developed a standard that unifies criteria and requirements and implements the minimum cybersecurity bases for all vehicles. Cesvimap (Mapfre’s Center for Experimentation and Road Safety) for its part lists the measures that manufacturers will have to take. “The UNECE regulation requires manufacturers to maintain a certified cybersecurity management system that must be reviewed and renewed at least every three years.” Without this, manufacturers and suppliers will no longer be able to homologate or sell vehicles, components or software in the EU after June 2022.
Some examples are using the Bluetooth system so that when the phone and vehicle are paired, it can get a dump of your data and personal information, use it to know your position and spy on you, harass you, impersonate your identity… It can also attack the e-call or emergency call system to prevent assistance in the event of an accident. In addition, it can activate or deactivate the airbags, take over the steering wheel and brakes to cause an accident, provide you with false information via the GPS or the RDS system of the radio…
Even Ford has made its car available to car owners for the first time
reinforced security system connected to a smartphone, SecuriAlert (formerly known as Guard Mode). Once activated, it sends a notification to the vehicle owner’s smartphone if it identifies any activity in the vehicle, including attempts to open the doors or gain access with the key, giving customers peace of mind when their car is out of sight. is, or of the ear.
And don’t forget autonomous or electric cars, which open up new forms of attack: for example, to cause your electrical system or the charging point in the event of an expensive breakdown or theft, to cause a fire with a fatal risk.
be aware: No car is immune. Depending on the degree of digitization of our car, it will be more or less vulnerable. The only way to reduce it is to understand it and stay alert.
updated software: Usually updates are made to close cybersecurity holes. Keep your vehicle’s software up to date with the versions provided by the manufacturer.
scan before connecting: USB devices are the most common Trojan for installing malicious software. It is essential to pass the antivirus for any USB device before connecting it to our car.
Switch off: All connectors are input and output ports. Turn off Wi-Fi and Bluetooth when not in use. Don’t forget to determine who (better, not) you offer your vehicle’s Wi-Fi service to.
Beware of downloads.: The smartphone takes on more and more functions that were previously fulfilled by other devices. Always check which programs and applications you download, one of them could be a Trojan horse to take control of your car.
watch your keys: You can control a wide range of car functions with the most modern buttons. They can copy our signal – that’s the easiest – if we press the button to open and close the doors. Lock and unlock the car with the manual key in places that you do not consider safe.
Protect the controller: This step is an evolution of the previous one. Today they sell specialized bags that prevent access to the command signal and prevent someone from “accidentally” copying it for us.
Beware of OBD2: It is a communication port through which multiple electronic devices can be diagnosed, programmed or coded. It is very important to know where it is and what is connected to it (for example, some insurance companies offer devices that connect to OBD2 to study your driving habits and thus adjust the price of your insurance). It is a very tempting door for cyber criminals.
Source: La Verdad

I am Ida Scott, a journalist and content author with a passion for uncovering the truth. I have been writing professionally for Today Times Live since 2020 and specialize in political news. My career began when I was just 17; I had already developed a knack for research and an eye for detail which made me stand out from my peers.