7 clever ways hackers are stealing keyless cars

Wirelessly unlocking your car is convenient, but it comes at a price. The increasing number of keyless cars on the road has led to a new kind of crime — key fob hacks!  With the aid of new cheap electronic accessories and techniques, a key fob’s signal is now relatively easy for criminals to intercept or block. Imagine a thief opening your car and driving away with it without setting off any alarms!

According to the FBI, car theft numbers have been on a downward spiral since their peak in 1991. However, numbers have been steadily inching their way up again since 2015. In fact, there was a 3.8 percent increase in car theft cases in 2015, a 7.4 increase in 2016 and another 4.1 increase in the first half of 2017.

In order to fight this upward trend and prevent your car from becoming a car theft statistic itself, awareness is definitely the key.

So arm yourself against this new wave of car crimes. Here are the top keyless car hacks everyone needs to know about.

1. Relay hack

Always-on key fobs present a serious weakness in your car’s security. As long as your keys are in range, anyone can open the car and the system will think it’s you. That’s why newer car models won’t unlock until the key fob is within a foot.

However, criminals can get relatively cheap relay boxes that capture key fob signals up to 300 feet away, and then transmit them to your car.

Here’s how this works. One thief stands near your car with a relay box while an accomplice scans your house with another one. When your key fob signal is picked up, it is transmitted to the box that’s closer to your car, prompting it to open.

In other words, your keys could be in your house, and criminals could walk up to your car and open it. This isn’t just a theory either; it’s actually happening.

According to the German Automotive Club, here are the top cars that are vulnerable to key fob relay attacks:

Audi: A3, A4, A6

Continue reading

New clever bank phishing scam is spreading and it's duping even the experts

Criminals are counting on us to overlook details and fall for their tricks. It just takes one mistake to have your entire bank account drained or your identity stolen. Crooks are getting sophisticated and they are polishing their techniques constantly, waiting for the perfect moment to pounce.

Continue reading

Who are the biggest cybersecurity threats to the U.S.?

Open/download audioThe U.S. is a target of cyber attacks and cyber terrorists. An FBI agent mapped out the biggest threats. What’s being done and what would happen if we were hit with a massive attack?

Learn more about your ad choices. Visit megaphone.fm/adchoices

Another Netflix scam is making the rounds - Here's how to spot it

Crooks are always on the lookout for opportunities to trick potential victims into forking over some of their hard-earned cash. As such, they tend to target popular online services like Netflix. But watch out, scammers are sending fake Netflix emails again! If you’re not careful, they can drain you entire bank account. Warn your friends and family too so they don’t fall for it.

Continue reading

Research: 50% of all calls are robocalls, how to stop them on your phone

Robocalls are quite simply the most annoying modern tech drawback for many people. And aside from trying to sell you stuff, robocalls can be downright deceptive and malicious. Robocall scams are actually trying to rip you off or steal your identity. But is relief in sight? If anything, the robocall problem is just getting worse each year. But how worse, exactly? ou’ll be shocked with how robocalls are poised to take over more of our lives in years to come.

Continue reading

New! Join the Komando Ambassador Program today!

You know Kim Komando is the go-to expert for advice on everything digital. From the best computer to the latest smartphones to how to protect yourself online, Kim’s got the answers on her weekly radio show that reaches 6.5 million listeners.

Continue reading

Watch out! New Costco phone scam targets consumers

It’s amazing how many sneaky ways criminals find to rip us off. You’d think they would eventually run out of ideas, but that doesn’t seem to be happening anytime soon. This particular scam is very convincing and people all across the country are falling for it. Whether you’re a Costco member or not, you’re at great risk.

Continue reading

Beware of a Chinese phone scam that reaches across the United States

There are of course robocalls, which none of us like, but those are pretty easy to identify and hang up on. But what if you answered and the message was in Mandarin and it said to be from the Chinese consulate? If you understand the language you might be a bit more inclined to pay attention, so when the voice says you need to take some steps in order to avoid any kind of trouble with the government, you might listen.

Continue reading

What was that strange object on the surface of Mars?

One clear sign your Android has a virus

Hackers around the world work day and night to figure out ways to break into your Android smartphone to collect personal and private information. They want all the information in your smartphone, from bank accounts and passwords to email and social media. That’s why you should keep your eyes peeled for the most obvious signs of Android malware.

Continue reading

Deepfake video technology is the next big thing in fake news

Fake news is one of the scourges of our increasingly connected world. With billions having instant access to social media sites and the web, misinformation can spread quickly like wildfire. To discern what’s bogus from real, we typically rely on concrete proof, like a video, for example, to prove that something was actually said or done.

Continue reading

How to start your own podcast

So you want to start a podcast. You probably already have some favorite podcasts. Maybe you like the podcast versions of your favorite sports talk shows, follow the quirky history stories of The Futility Closet, or keep up on the latest political discussions. You want in on the podcast world, but there’s more to it than just talking into a microphone.

Continue reading

Top 3 things burglars are looking for and how to protect your home

Summer is one of the best times of the year. It’s finally warm enough to get outside and take your whole family on vacation. But there’s one little thing many people forget about. Summer isn’t just a busy travel season, it’s also one of the most popular times for home burglaries.

Continue reading

If you ever took a Facebook quiz you need to read this

USPS will now alert you if someone is scanning your mail online

The USPS is always trying to improve, and one of the things it implemented last year was meant to do just that. The thought was to share images of people’s mail with them every morning, before it was delivered, to ensure they knew what to expect in their box later that day. While the idea of having a preview seemed like a good one, it came with some major drawbacks.

Continue reading

Tools you're using to secure emails have a flaw — what to use to send secure messages

In case you didn’t know, email encryption is a secure way to protect your email from hackers, criminals and prying eyes. It’s a process where your email messages are scrambled so if hackers manage to intercept them, all they’ll see is gibberish.

Continue reading

Check your writing skills with this free website

Have you ever wondered if something you’ve written is actually being comprehended by the person reading it? Or are you not the strongest writer, and you could use a little proofreading help before you share your content with the world?

Continue reading

Your smart TV is spying on you

Open/download audioDo you have or did you just get a “smart” TV? Most new models have smart technology, which mean your TV will connect to the Internet. It also means you’re a target for hackers. Listen to my Komando On Demand FREE podcast to hear why you should be worried and what you can do about it.

Learn more about your ad choices. Visit megaphone.fm/adchoices

How to protect your car from a wireless fob relay attack

You’ve locked your car, but it’s not as safe as you think. Thieves have found a way to use cheap equipment to steal your vehicle. You’ll be shocked when you see how easy it is to gain access without picking locks or breaking windows. Luckily, the solution is simple.

Continue reading

How to listen to and delete everything you've ever said to Google

After decades as an invention of science fiction, voice-controlled technology is exploding in the real world, from smartphones to computers to cars. And it’s no wonder. What could be easier than skipping the keyboard and simply speaking to your gadget?

Continue reading