







{"id":42,"date":"2023-04-18T10:03:04","date_gmt":"2023-04-18T10:03:04","guid":{"rendered":"https:\/\/cissar.com\/?p=42"},"modified":"2023-04-18T10:03:04","modified_gmt":"2023-04-18T10:03:04","slug":"hackers-can-take-control-of-your-car-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/cissar.com\/index.php\/2023\/04\/18\/hackers-can-take-control-of-your-car-how-to-protect-yourself\/","title":{"rendered":"Hackers can take control of your car \u2013 how to protect yourself"},"content":{"rendered":"<div class=\"article-body\">\n<div class=\"featured featured-video video-ct\" data-v-b8a95802=\"\">\n<div class=\"contain\" data-v-b8a95802=\"\">\n<div class=\"control\" data-v-b8a95802=\"\"><a href=\"#\" class=\"top\" data-v-b8a95802=\"\"><\/a> <a href=\"#\" class=\"close\" data-v-b8a95802=\"\">close<\/a><\/div>\n<div class=\"video-container\" data-v-b8a95802=\"\">\n<div data-video-id=\"6311590232112\" data-video-domain=\"foxnews\" data-widget-type=\"embed\" class=\"m video-player\" data-v-b8a95802=\"\"><a href=\"http:\/\/video.foxnews.com\/v\/6311590232112\" data-v-b8a95802=\"\"><picture data-v-b8a95802=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/288\/162\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/576\/324\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(max-width: 767px)\" data-v-b8a95802=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/672\/378\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/1344\/756\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 768px) and (max-width: 1023px)\" data-v-b8a95802=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/676\/380\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/1352\/760\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 1024px) and (max-width: 1279px)\" data-v-b8a95802=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/896\/500\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/1792\/1000\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 1280px)\" data-v-b8a95802=\"\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/bab34bf3-6822-44eb-a0de-4f61207ffd5a\/62874553-02c5-45d6-9cd4-13ab778e2f28\/1280x720\/match\/896\/500\/image.jpg?ve=1&#038;tl=1\" alt=\"Fox News Flash top headlines for March 30\" width=\"896\" height=\"500\" data-v-b8a95802=\"\"><\/source><\/source><\/source><\/source><\/picture> <span class=\"overlay\" data-v-b8a95802=\"\">Video<\/span><\/a><\/div>\n<\/div>\n<div class=\"info\" data-v-b8a95802=\"\">\n<div class=\"caption\" data-v-b8a95802=\"\">\n<h4 class=\"title\" data-v-b8a95802=\"\"><a href=\"https:\/\/www.foxnews.com\/video\/6311590232112\" data-v-b8a95802=\"\">Fox News Flash top headlines for March 30<\/a><\/h4>\n<p data-v-b8a95802=\"\">Fox News Flash top headlines are here. Check out what&#8217;s clicking on Foxnews.com.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"speakable\">The right software can turn your smartphone into a spy device that watches everything you do. Scary, I know. <a href=\"https:\/\/www.komando.com\/kims-column\/stop-phone-spies\/871613\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Here\u2019s how to check if your phone is infected.<\/u><\/a>\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban1\" id=\"mobile-mw-ad-ban1\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb2\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p class=\"speakable\">While you\u2019re at it, check your computer. <a href=\"https:\/\/www.komando.com\/kims-column\/computer-spy-check\/835553\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>These are the signs that stalkerware is hard at work<\/u><\/a> tracking your web activity, searches, and even the passwords you type in.\u00a0<\/p>\n<p>Shockingly, <a href=\"https:\/\/www.foxnews.com\/category\/auto\" target=\"_blank\" rel=\"noopener\">your car isn\u2019t immune<\/a>. With the proper electronics and software techniques, a determined hacker can intercept or block your key fob signal, infiltrate your car\u2019s software, and even remotely control your vehicle.\u00a0<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb2\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>So, is <i>your<\/i> connected car hackable? Most likely, yes. Here\u2019s how.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban2\" id=\"mobile-mw-ad-ban2\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.foxnews.com\/tech\/human-talking-fast-food-drive-thru\" target=\"_blank\" rel=\"noopener\"><strong>THAT&#8217;S NOT A HUMAN TALKING TO YOU IN THE FAST FOOD DRIVE-THRU<\/strong><\/a><\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb3\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><a href=\"http:\/\/www.komando.com\/subscribe\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>Join 400,000+ who get my free daily tech news email.<\/u><\/strong><\/a><strong>\u00a0<\/strong>\u00a0<\/p>\n<p><strong>Software hacks<\/strong>\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban3\" id=\"mobile-mw-ad-ban3\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><strong>Compromised car apps<\/strong>\u00a0<\/p>\n<p>Does your car have <a href=\"https:\/\/www.foxnews.com\/category\/tech\/technologies\/smartphones\" target=\"_blank\" rel=\"noopener\">a smartphone app that allows you<\/a> to unlock and start it remotely? Almost every car manufacturer offers this convenience in some makes and models.\u00a0\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb4\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Account usernames and passwords protect these apps. If hackers can break into your account or exploit a bug in the car\u2019s software, they can compromise your entire vehicle.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban4\" id=\"mobile-mw-ad-ban4\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb3\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>My advice: <\/strong>To protect your remote start app, change the default password, <a href=\"https:\/\/www.komando.com\/tech-tips\/creating-strong-passwords\/592778\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>use strong and unique credentials<\/u><\/a> and <i>never<\/i> reuse your passwords from other services. <a href=\"https:\/\/www.komando.com\/columns\/521729\/one-vital-step-you-must-take-now-to-protect-your-online-accounts-from-hackers-and-scammers\" target=\"_blank\" rel=\"nofollow noopener\"><u>Enable two-factor authentication<\/u><\/a> if you can, and keep that software current.\u00a0<\/p>\n<p><strong>Telematics exploits<\/strong>\u00a0<\/p>\n<p>Telematics is the broad term describing a connected system that remotely monitors your vehicle&#8217;s behavior. This data may include your car&#8217;s location, speed, mileage, tire pressure, fuel use, braking, engine\/battery status, and driver behavior.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban5\" id=\"mobile-mw-ad-ban5\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb5\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>By now, you know anything connected to the internet is vulnerable to exploitation. <a href=\"https:\/\/www.foxnews.com\/category\/tech\/topics\/hackers\" target=\"_blank\" rel=\"noopener\">Hackers that intercept your connection<\/a> can track and even control your vehicle remotely. Now that\u2019s scary.\u00a0<\/p>\n<p><strong>My advice: <\/strong>Before you get a car with built-in telematics, consult with your car dealer about the cybersecurity measures they\u2019re employing on connected vehicles. If you have a connected car, ensure its onboard software is always up-to-date.\u00a0<\/p>\n<div baseimage=\"https:\/\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/Parking-space-image.jpg\" source=\"Fox News\" class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/343\/192\/Parking-space-image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/686\/384\/Parking-space-image.jpg?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 767px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/672\/378\/Parking-space-image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/1344\/756\/Parking-space-image.jpg?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/931\/523\/Parking-space-image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/1862\/1046\/Parking-space-image.jpg?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/720\/405\/Parking-space-image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/1440\/810\/Parking-space-image.jpg?ve=1&#038;tl=1 2x\"><img decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2021\/06\/640\/320\/Parking-space-image.jpg?ve=1&#038;tl=1\" alt=\"Aerial view of cars in a parking lot\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>Aerial view of cars in a parking lot<\/span> <\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Networking attacks<\/strong>\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban6\" id=\"mobile-mw-ad-ban6\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Here\u2019s a throwback. Cybercriminals can also employ old-school denial-of-service attacks to overwhelm your vehicle and potentially shut down critical functions like airbags, anti-lock brakes, and door locks.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb6\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb4\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>This attack is feasible since some connected <a href=\"https:\/\/www.foxnews.com\/category\/tech\/technologies\/wifi\" target=\"_blank\" rel=\"noopener\">cars have built-in Wi-Fi hotspot<\/a> capabilities. As with regular home Wi-Fi networks, they can even steal your data if they infiltrate your car\u2019s local network.\u00a0<\/p>\n<p>Also, it\u2019s a matter of physical safety. Remember, multiple computers and Engine Control Modules run modern cars. If hackers can shut these systems down, they can put you in grave danger.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban7\" id=\"mobile-mw-ad-ban7\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><strong>My advice: <\/strong>Regularly changing your car\u2019s onboard Wi-Fi network password is a must. Turning off your car\u2019s Bluetooth and Wi-Fi is also a good idea when not in use.\u00a0<\/p>\n<p>Your home\u2019s Wi-Fi needs to stay locked down, too. <a href=\"https:\/\/www.komando.com\/tech-tips\/how-to-see-all-the-devices-connected-to-your-network\/611057\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Use these steps to find and remove anything that shouldn\u2019t be on your network.<\/u><\/a>\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb7\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>Onboard diagnostics (OBD) hacks<\/strong>\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban8\" id=\"mobile-mw-ad-ban8\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Every newer car has an onboard diagnostics port. This interface allows mechanics to access your car\u2019s data, read error codes and statistics, and even program new keys.\u00a0<\/p>\n<p>Anyone can buy exploit kits that can utilize this port to replicate keys and program new ones to use them for stealing vehicles.\u00a0\u00a0<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb5\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>My advice:<\/strong> Always go to a reputable mechanic. A physical steering wheel lock can also give you extra peace of mind.\u00a0<\/p>\n<p><a href=\"https:\/\/www.foxnews.com\/auto\/ford-made-type-vehicle-extinct\" target=\"_blank\" rel=\"noopener\"><strong>FORD JUST MADE THIS TYPE OF VEHICLE EXTINCT<\/strong><\/a><\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban9\" id=\"mobile-mw-ad-ban9\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb8\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>In-car malware<\/strong>\u00a0<\/p>\n<p>Another old-school internet hack reaches connected cars, specifically models with internet connectivity and built-in web browsers.\u00a0<\/p>\n<p>Crooks can send you emails and messages with malicious links and attachments that can install malware on your car\u2019s system. Anything is possible once the malware is installed.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban10\" id=\"mobile-mw-ad-ban10\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Car systems <a href=\"https:\/\/www.foxnews.com\/category\/tech\/topics\/cybercrime\" target=\"_blank\" rel=\"noopener\">don\u2019t have built-in malware protections<\/a>, so this can be hard to spot.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb9\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>My advice: <\/strong>Practice good computer safety practices even when connected to your car. Never open emails and messages nor follow links from unknown sources.\u00a0<\/p>\n<p>Security 202: <a href=\"https:\/\/www.komando.com\/safety-security-reviews\/how-to-remove-malware\/792925\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>How to remove malware from your phone or computer<\/u><\/a>\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban11\" id=\"mobile-mw-ad-ban11\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb6\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>Key fob attacks<\/strong>\u00a0<\/p>\n<p>With the proliferation of cheap electronics and relay gadgets that can be purchased easily online, key fob attacks are more common than ever.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb10\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>The relay hack<\/strong>\u00a0<br \/>\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban12\" id=\"mobile-mw-ad-ban12\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div baseimage=\"https:\/\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/tesla-key.jpg\" source=\"Fox News\" class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/343\/192\/tesla-key.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/686\/384\/tesla-key.jpg?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 767px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/672\/378\/tesla-key.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/1344\/756\/tesla-key.jpg?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/931\/523\/tesla-key.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/1862\/1046\/tesla-key.jpg?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/720\/405\/tesla-key.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/1440\/810\/tesla-key.jpg?ve=1&#038;tl=1 2x\"><img decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2023\/03\/640\/320\/tesla-key.jpg?ve=1&#038;tl=1\" alt=\"\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span><\/span> <span>(Tesla)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>Always-on key fobs present a serious weakness in your car\u2019s security. If your keys are in range, anyone can open the car, and the system will think it\u2019s you. That\u2019s why newer car models won\u2019t unlock until the key fob is within one foot.\u00a0<\/p>\n<p>However, criminals can get relatively cheap relay boxes that capture key fob signals up to 300 feet away and transmit them to your car.\u00a0<\/p>\n<p>One thief stands near your car with a relay box while an accomplice scans your house with another. When your key fob signal is picked up, it is transmitted to the box closer to your car, prompting it to open.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban13\" id=\"mobile-mw-ad-ban13\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb11\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Keep reading for steps on how to protect your keyfob.\u00a0<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb7\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>Keyless jamming<\/strong>\u00a0<\/p>\n<p>In this scenario, crooks will block your signal. Say you issue a lock command from your key fob. It won\u2019t reach your car, and your doors will remain unlocked. The crooks can then have free access to your vehicle.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban14\" id=\"mobile-mw-ad-ban14\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><strong>My advice: <\/strong>Always manually check your car doors before stepping away. You can also install a steering wheel lock to deter thieves from stealing your car, even if they get inside.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb12\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>How to stop key fob attacks<\/strong>\u00a0<\/p>\n<p>There are a few easy ways to block key fob attacks. You can buy a signal-blocking pouch that can hold your keys, like a shielded <a href=\"https:\/\/amzn.to\/2EasdhB\" target=\"_blank\" rel=\"nofollow noopener\"><u>RFID-blocking pouch<\/u><\/a>.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban15\" id=\"mobile-mw-ad-ban15\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><strong>Stick it in the fridge \u2026<\/strong>\u00a0<\/p>\n<div baseimage=\"https:\/\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/airtag.png\" source=\"Getty Images\" class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/343\/192\/airtag.png?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/686\/384\/airtag.png?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 767px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/672\/378\/airtag.png?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/1344\/756\/airtag.png?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/931\/523\/airtag.png?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/1862\/1046\/airtag.png?ve=1&#038;tl=1 2x\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/720\/405\/airtag.png?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/1440\/810\/airtag.png?ve=1&#038;tl=1 2x\"><img decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2022\/12\/640\/320\/airtag.png?ve=1&#038;tl=1\" alt=\"Apple AirTag device on keychain.\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>Apple AirTag device on keychain.<\/span> <span>(Melina Mara\/The Washington Post via Getty Images)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>Here\u2019s a free solution: Stick your key fob into the refrigerator or freezer. The multiple layers of metal will block the signal. Just check with your manufacturer to ensure freezing your key fob won\u2019t damage it.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb13\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb8\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>\u2026 or even inside the microwave<\/strong>\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban16\" id=\"mobile-mw-ad-ban16\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>The microwave will also block signals. Just don\u2019t turn it on.\u00a0\u00a0<\/p>\n<p><strong>Wrap your key fob in foil<\/strong>\u00a0<\/p>\n<p>Since your key fob\u2019s signal is blocked by metal, you can also wrap it up in aluminum foil. While it\u2019s the easiest solution, it can leak the signal if you don\u2019t do it right. You could also make a foil-lined box to put your keys in if you\u2019re in a crafting mood.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban17\" id=\"mobile-mw-ad-ban17\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb14\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>Keep your tech-know going\u00a0<\/strong>\u00a0<\/p>\n<p>My popular podcast is called &#8220;<a href=\"https:\/\/www.komando.com\/podcast\/kim-komando-explains\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Kim Komando Today<\/u><\/a>.&#8221; It\u2019s a solid 30 minutes of tech news, tips, and callers with tech questions like you from all over the country. Search for it wherever you get your podcasts. For your convenience, hit the link below for a recent episode.\u00a0<\/p>\n<p><strong>TECH ADVICE ON THE GO: <\/strong><a href=\"https:\/\/www.komando.com\/episode\/amazons-party-drug-trade-scam-targeting-google-users-5-signs-your-webcam-is-hacked\/882370\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>Amazon&#8217;s party drug trade, scam targeting Google users &#038; 5 signs your webcam is hacked<\/u><\/strong><\/a>\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban18\" id=\"mobile-mw-ad-ban18\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb9\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Plus, I share the shocking reason UFO sightings are skyrocketing, how to protect your skis with GPS trackers, the top three police scanner apps, and my $456.76 money-saving hack. And I help folks with security cams, set up a new site, and recover from a Discord scam. There\u2019s a healthy dose of puns, too!\u00a0\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb15\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Check out my podcast &#8220;Kim Komando Today&#8221; on <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/tech-you-should-know\/id660921339\" target=\"_blank\" rel=\"nofollow noopener\">Apple<\/a>,<a href=\"https:\/\/podcasts.google.com\/feed\/aHR0cDovL2tvbWFuZG9vbmRlbWFuZC5raW1rb21hbmRvLmxpYnN5bnByby5jb20vcnNz\" target=\"_blank\" rel=\"nofollow noopener\"> <u>Google Podcasts<\/u><\/a>, <a href=\"https:\/\/open.spotify.com\/show\/4eUk1IfOM97wc553JtrKyl\" target=\"_blank\" rel=\"nofollow noopener\"><u>Spotify<\/u><\/a>, or your favorite podcast player.\u00a0<\/p>\n<p><a href=\"https:\/\/www.komando.com\/podcasts\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Listen to the podcast here<\/u><\/a> or wherever you get your podcasts. Just search for my last name, &#8220;Komando.&#8221;\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban19\" id=\"mobile-mw-ad-ban19\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Sound like a tech pro, even if you\u2019re not! Award-winning popular host Kim Komando is your secret weapon. <a href=\"https:\/\/www.komando.com\/station-finder\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Listen<\/u><\/a> on 425+ radio stations or <a href=\"https:\/\/www.komando.com\/podcast\/kim-komando-today\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>get the podcast<\/u><\/a>. And join over 400,000 people who <a href=\"https:\/\/www.komando.com\/tip-newsletter\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>get her free 5-minute daily email newsletter.<\/u><\/a>\u00a0<\/p>\n<p><a href=\"https:\/\/www.foxnews.com\/download\" target=\"_blank\" rel=\"noopener\"><strong>CLICK HERE TO GET THE FOX NEWS APP<\/strong><\/a><\/p>\n<p>Copyright 2023, WestStar Multimedia Entertainment. All rights reserved.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb16\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"article-meta\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>close Video Fox News Flash top headlines for March 30 Fox News Flash top headlines are here. Check out what&#8217;s clicking on Foxnews.com. The right software can turn your smartphone into a spy device that watches everything you do. Scary, I know. Here\u2019s how to check if your phone is infected.\u00a0 While you\u2019re at it, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":43,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,9],"tags":[],"class_list":["post-42","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tech"],"_links":{"self":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":1,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/42\/revisions"}],"predecessor-version":[{"id":59,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/42\/revisions\/59"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/media\/43"}],"wp:attachment":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/media?parent=42"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/categories?post=42"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/tags?post=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}