DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

How an Hacker Can Unlock any Luxury Car

DigitalCIO Bureau by DigitalCIO Bureau
February 18, 2020
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Recently, an hacker created a new device that can unlock any luxury car. Read on to know more…

As motor vehicles are fitted with more digital controls and Internet-connected devices, they are becoming more vulnerable to cybercriminals, who can hack into those systems just like they can hack the computers. For instance, almost any digitally connected device in a car could become an entry point to the vehicle’s central communications network, opening a door for hackers to potentially take control by.

There have been only a handful of successful hacks on vehicles so far, carried out mostly to demonstrate potential weaknesses — such as opening the doors of a car and taking its control. According to a IANS news report, an hacker created a new device that can unlock any luxury car. The hacker named San Francisco: The hacker known as “EvanConnect” used the device “keyless repeater” which he sells for $9,000 and demonstrated that how it works in a video which he released recently.

Shocking Disclosure
In the video, EvanConnect is seen approaching an unattended car which belongs to his friend who gave him permission to use it and using the small handheld device with an antenna to unlock the driver’s side door of the car and start the engine, dailymail.co.uk reported. In the video, he admits there is no guarantee as to how his customers might use the device.

He said in an interview that his device works on all luxury cars except for those that use frequencies between 22 and 40 khz, such as Mercedes, Audi, Porsche, Bentley and Rolls Royce models released after 2014. In addition, he also mentioned about the upgraded version of the same for $12,000 which can unlock any car that uses a wireless fob system.

The new vulnerability comes as auto makers are increasingly using software to control features and functions that have long been dominated by hardware, such as braking, gear shifting and throttle control. It represents a seminal break from the mechanical hydraulic systems of the recent past, one that began with the introduction of electronically controlled fuel injection in the late 1960s.

Valuable Lessons
There are lessons here for other established Industries stepping into the IoT. To ensure the safety of smart products, safeguard corporate reputations and retain customers, it’s essential to identify and respond to security vulnerabilities before cybercriminals can find and exploit them. To that end, manufacturers need to issue security patches and updates proactively — both for products in the wild and within their own IT sector. Of course, this kind of forward-looking security demands the ability to identify vulnerabilities in advance.

The Road Ahead
Newer cars have modems enabling Internet connectivity; today, these are used mostly used for entertainment, but they are fast evolving into portals for software upgrades of critical systems and for sending data to cloud-computing networks.

The threat of regular people having their vehicles digitally carjacked by cyberattackers is real. In reality, car hacking could be the new carjacking. But security experts paint a grim picture of what might lie ahead. They see a growing threat from malicious hackers who access cars remotely and keep their doors locked until a ransom is paid.

To conclude — while the vulnerabilities in connected cars highlight the growing importance of security in the IoT age, we should beware overhyping the implications of these hacks. After all, these compromises were achieved by security researchers.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

SE Labs Award Validates NetApp’s Status as the World’s Most Secure Storage

by DigitalCIO Bureau
July 8, 2025
0

NetApp has announced that it was recognized as a standout performer in cybersecurity in the SE LABS  Awards 2025. NetApp won the 2025 SE Labs Award for Enterprise...

Read moreDetails

India’s Digital Identity Surge Comes with Rising Concerns Around AI and Trust: Okta Report

by DigitalCIO Bureau
July 3, 2025
0
The Evolving Role of AI in Data Protection

Indian consumers continue to rapidly adopt digital technologies while navigating unique challenges in trust and security, reveals the 2025 Customer Identity Trends Report from Okta, The World’s Identity...

Read moreDetails

Pax8 Introduces Era of Managed Intelligence

by DigitalCIO Bureau
June 19, 2025
0
Pax8 Introduces Era of Managed Intelligence

Pax8 has released its inaugural research report, The Agentic Inflection Point: And the Rise of the Managed Intelligence Provider. The comprehensive study defines the future of small-to-midsized business (SMB) operations, transformed...

Read moreDetails

Barracuda Unveils AI-Powered Cybersecurity Platform BarracudaONE in India

by DigitalCIO Bureau
June 3, 2025
0

Barracuda Networks has unveiled the BarracudaONE AI-powered cybersecurity platform. BarracudaONE maximizes threat protection and cyber resilience by unifying layered security defenses and providing deep, intelligent threat detection and response for...

Read moreDetails

Check Point Acquires Veriti To Minimize Digital Vulnerabilities

by DigitalCIO Bureau
May 28, 2025
0
Check Point Acquires Veriti To Minimize Digital Vulnerabilities

Check Point Software Technologies has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform. “The acquisition of Veriti...

Read moreDetails
Next Post

‘National Cybersecurity Strategy 2020 soon’

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Proofpoint Named a Leader in 2024 Gartner Magic Quadrant

Proofpoint Named a Leader in 2024 Gartner Magic Quadrant

December 26, 2024

Intel Showcases New Products and Partnerships Accelerating the 5G Revolution

February 26, 2019
Brillio Announces Investment by The Orogen Group

Brillio Announces Investment by The Orogen Group

September 6, 2023

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?