MOTORISTS have been warned that hackers could hijack their car’s dashboard screen and blast out sounds to distract them.
Experts claim to have unearthed a number of vulnerabilities affecting ’s AirPlay and systems.

CarPlay is available in more than car 800 models, including big brands like , BMW, and VW.
As well as taking over the dashboard screen, bad actors could track the vehicle’s location and listen in on chats too, according to researchers at Oligo.
They say it could be carried out by simply connecting to the car’s hotspot.
And it’s particularly troublesome if you have a basic or default password.
Techies refer to this as a Remote Code Execution (RCE) attack, specifically dubbed “AirBorne”;.
“If the device has a default, predictable or known wifi hotspot password, it is possible to gain access and then execute the RCE,”; they warn.
Even for CarPlay devices that require a PIN there could be a risk, as a hacker could be close by to snoop on your screen for the code.
Apple is believed to have already patched the issue but it’s down to third party manufacturers to deploy the software updates, a security expert told Wired.
The tech giant hasn’t responded to The Sun’s request for comment.
In total, Oligo revealed 23 security loopholes.
Most of these concern AirPlay, the popular Apple feature that lets you cast content from products like an to your TV screen or other devices.
Two of the issues uncovered were identified as “wormable”; meaning cyber crooks could take over an AirPlay device and then spread harmful malware throughout “any local network the infected device connects to”; as long as they’re connected to the same Wi-Fi as you.
They could also get hold of your files and sensitive information.
“Apple and Oligo have worked together to thoroughly identify and address the vulnerabilities with the goal of protecting end-users,”; Oligo said.
“Apple has released its latest versions of software to address the vulnerabilities and has allowed time for those devices to be updated.”;