Cars today don’t just get you from point A to point B anymore. With features like built-in GPS navigation, touchscreen infotainment systems, and self-driving technology, they’re basically rolling computers. But just like with any tech, these advancements come with some new risks, like the possibility of someone hacking into your car.
This guide will explain what makes a car hackable, define key terms related to vehicle hacking, and offer practical tips for protecting your car.
What Is a Hackable Car?
A hackable car is any vehicle that can be accessed or controlled by an unauthorized third party through its digital systems.
Modern cars run complex software that controls everything from navigation and entertainment to braking and advanced driver assistance systems (ADAS). Because these systems can connect to the internet or other devices, hackers could, in theory, find ways to access or manipulate them. The more connected features a car has, the more opportunities there are for someone to try to break in.
Hackable Car Glossary
To better understand the risks and protections associated with vehicle hacking, it helps to be familiar with the terminology. Here’s a glossary of relevant terms:
Autonomous Vehicles
Autonomous vehicles are self-driving vehicles equipped with technology to navigate roadways without intervention from a human driver. These vehicles are equipped with an advanced Laser Illuminating Detection and Ranging (LIDAR) system, which creates a 3D map by bouncing a laser beam off surfaces to create a computer view of the surrounding environment. These vehicles also use GPS maps, radar, sonar, cameras, and an array of sensors to avoid real-world collisions and hazards.
Connected Car
A connected car is a vehicle that has internet access through an installed mobile hotspot or in-car Wi-Fi. Vehicles with built-in Bluetooth compatibility, GPS navigation systems, and newer infotainment systems use outside networks and are connected to the internet.
Control Area Network (CAN)
Commonly shortened to “CAN,” this system is made up of a series of lines that allow data transfer and communication between various computer systems within a vehicle. The CAN regulates a vehicle’s command network.
Cybersecurity
Cybersecurity is any measure or means taken to protect and secure electronic data from unauthorized or criminal use.
Electronic Control Units (ECU)
Commonly referred to as a vehicle’s “ECU,” this controls the electrical system and its subsystems. The ECU monitors engine operation (i.e., airflow, idle speed, ignition timing, and other important vehicle operations).
Engine Disabler
An engine disabler is a device that automobile owners can connect to their vehicle to stop the engine from starting.
Hacker
A hacker is a term used in reference to an individual who uses a computer to access another party’s computer and the files on it. While companies can hire hackers in a research capacity to test the overall security of their products, those who hack into data without authorization are considered cybercriminals.
In-Car Wi-Fi
A wireless network that’s built into the vehicle. Today, this is considered a luxury feature. Manufacturers have begun including built-in Wi-Fi routers in factory-installed components. These components are compatible with an array of devices and are usually under warranty.
Infotainment System
Also known as in-vehicle entertainment (IVE) or in-car entertainment (ICE), infotainment systems provide in-car audio and/or video entertainment. This connected hardware has become increasingly popular in modern vehicles, providing access to satellite radio and apps, and can provide access to hands-free voice and audio controls from the steering wheel or dashboard.
Key Fob
A key fob is used in modern vehicles with keyless entry. The small device generates random codes and is used to wirelessly unlock a vehicle. Key fob codes are hackable, and transmissions between the device and vehicle can be intercepted to gain physical entry.
Mobile Hotspot
A personal device that can create a Wi-Fi connection that allows devices within its range to connect to the internet. They are portable and serve as a link between Wi-Fi capable devices (i.e., phones, tablets, and laptops) and cellular networks.
On-Board Diagnostics-II (OBD-II)
Modern vehicles are equipped with on-board diagnostic ports so that mechanics can easily access computer information and read error codes. The OBD-II is a second-generation, standardized diagnostic port, and it’s included on most vehicles purchased after 1996. While the location of the OBD-II port differs from vehicle to vehicle, the port is typically located on the inside of the car underneath the dashboard.
Smartphones
Smartphones are cellular phones that perform many of the functions of a computer, with internet access and GPS capabilities, as well as an operating system capable of running downloadable applications. They can be synced to vehicle functions via Bluetooth, making them vulnerable to being hacked and used to unlock and start a vehicle remotely. The vehicle’s location can also be tracked via GPS using a smartphone.
Vehicle Cybersecurity
Vehicle cybersecurity refers to any measure or means taken to secure a vehicle’s connected systems from any unauthorized or criminal entry or use.
Vehicle Hacking
Vehicle hacking refers to any unauthorized or criminal access to a vehicle’s connected systems, whether to access personal information, gain entry to a vehicle, or take control of vehicle functions.
How to Protect Your Car From Being Hacked
While the thought of vehicle hacking can be alarming, there are practical steps you can take to protect yourself. Take a look at some of these tips below:
Be Mindful of Dongles
Dongles are small devices that plug into your car’s OBD-II port to track driving data or performance. They’re convenient, but also a potential entry point for hackers. If you use one, unplug it when you’re not driving to lower your risk.
Protect Your Key Fob
Thieves can use signal amplifiers to copy your key fob’s signal and unlock your car. An easy fix? Store your keys in a metal container. The metal blocks or weakens the signal, making it harder for someone to hijack it.
Turn Off Wireless Features You Don’t Need
Today’s cars have many connections (e.g., Wi-Fi, Bluetooth, and built-in hotspots). Each active connection can give hackers another way in. Check your owner’s manual and disable anything you’re not using.
Keep Your Software Up to Date
Just like your phone or computer, your car’s software needs regular updates to stay protected. Automakers release patches to fix vulnerabilities, sometimes through recalls or over-the-air updates. Always confirm that the update notice comes directly from your manufacturer before installing it, or visit your dealership to handle it safely.
Get It Checked If Something Feels Off
If your car starts acting strangely (e.g., systems resetting on their own or odd messages popping up), it’s best to have it looked at. A dealership or trusted mechanic can tell whether it’s a harmless glitch or something more serious.
For more tips on staying safe, visit our guides on cyberattack threats to your vehicle and our hackable cars FAQs.
Stay Protected on the Road
From hands-free navigation to automatic updates, car technology keeps getting smarter. But as vehicles become more connected, they also face new kinds of risks, like automated hacking.
The best way to stay ahead is to stay informed. A few smart habits can help you enjoy all the perks of a modern car without worrying about cyber threats.
And if you’re looking for extra peace of mind on the road, make sure you’re protected with the right auto insurance. Mercury offers reliable, affordable coverage without cutting corners on quality.
