Transcript
Page 1: Today’s Connected Vehicle Thieffiles.digitaltrends.com/.../2016_LoJack_Vehicle... · Connected Vehicle 1. VEHICLE RANSOM: Cybercriminals could break into a vehicle, disable the

High-tech Waysto Steal aConnectedVehicle

1. VEHICLE RANSOM: Cybercriminals could break into a vehicle, disable the engine and brakes, and demand payment to restore the vehicle

2. SCANNER BOXES: Devices that exploit an electronic system utilized by key fobs. Criminals can unlock, and start a vehicle without even touching the key

3. IDENTITY THEFT: Thieves targeting the data within your vehicle

4. CAR CLONING: Installation of a fake vehicle identification number (VIN), allowing a stolen vehicle to go unnoticed and false new documents to be created

5. LUXURY VEHICLE THEFT RINGS: Organized crime rings target high value vehicles, which can be cut up for parts, re-sold or shipped overseas

A Smarter, More Advanced Thief*

Of consumers fear cars in the future will be

easily hacked

62%

Of consumers don’t trust any entity with

private data

68% Of consumers believe they’re responsible for securing their vehicle

from being hacked

15%

USE TRACKING &STOLEN VEHICLE RECOVERY

TECHNOLOGY

BE INFORMED OF RECALLS& SOFTWARE UPDATES

HIDE ALL VALUABLESBE SELECTIVE WITHSENSITIVE DATA

Vehicle models equipped with internet

access as a standard in 2016

133

Vehicle ThiefToday’s Connected

With the emergence of sophisticated technology, thenature of vehicle theft has changed.

Connected Car Theft Prevention Tips

*Source: Kelley Blue Book Strategic Insights, “Braking the Connected Car: The Future of Vehicle Vulnerabilities” https://www.rsaconference.com/writable/pre-sentations/file_upload/ht-t11-hacking-the-connected-car-thetfuturetof-vehicle-vulnerabilities.pdf. Accessed 7/1/2016 LoJack is a subsidiary of CalAmp. © 2016 LoJack Corporation, LoJack and the LoJack logo are trademarks or registered trademarks of the LoJack Corporation in the United States and other

Recommended