View
9
Download
0
Category
Preview:
Citation preview
High-tech Waysto Steal aConnectedVehicle
1. VEHICLE RANSOM: Cybercriminals could break into a vehicle, disable the engine and brakes, and demand payment to restore the vehicle
2. SCANNER BOXES: Devices that exploit an electronic system utilized by key fobs. Criminals can unlock, and start a vehicle without even touching the key
3. IDENTITY THEFT: Thieves targeting the data within your vehicle
4. CAR CLONING: Installation of a fake vehicle identification number (VIN), allowing a stolen vehicle to go unnoticed and false new documents to be created
5. LUXURY VEHICLE THEFT RINGS: Organized crime rings target high value vehicles, which can be cut up for parts, re-sold or shipped overseas
A Smarter, More Advanced Thief*
Of consumers fear cars in the future will be
easily hacked
62%
Of consumers don’t trust any entity with
private data
68% Of consumers believe they’re responsible for securing their vehicle
from being hacked
15%
USE TRACKING &STOLEN VEHICLE RECOVERY
TECHNOLOGY
BE INFORMED OF RECALLS& SOFTWARE UPDATES
HIDE ALL VALUABLESBE SELECTIVE WITHSENSITIVE DATA
Vehicle models equipped with internet
access as a standard in 2016
133
Vehicle ThiefToday’s Connected
With the emergence of sophisticated technology, thenature of vehicle theft has changed.
Connected Car Theft Prevention Tips
*Source: Kelley Blue Book Strategic Insights, “Braking the Connected Car: The Future of Vehicle Vulnerabilities” https://www.rsaconference.com/writable/pre-sentations/file_upload/ht-t11-hacking-the-connected-car-thetfuturetof-vehicle-vulnerabilities.pdf. Accessed 7/1/2016 LoJack is a subsidiary of CalAmp. © 2016 LoJack Corporation, LoJack and the LoJack logo are trademarks or registered trademarks of the LoJack Corporation in the United States and other
Recommended