Here's just a part of it: Generally speaking, if you want to gain access to a vehicle system, such as to reprogram a processor, etc, there are layers of security access.
First, generally speaking, in order to initiate any communications with the vehicle, you have to meet certain cyber security standards. These include having the vehicle in some sort of known state -- such as "Propulsion System NOT Active"....i.e. if the car is in Drive, the system is going to naturally reject any attempt to initiate communications.
Second, the vehicle is broken down into netoworks, with secure gateways between these networkds. So great, there is a satellite signal, and wifi, etc in the vehicle, but there is no "natural" connection between teh entertainment system utilizing these signals and, say, the powertrain system. Therefore, you would need to thouroughly understand the vehicle network, and build in (reprogram) network access from one sub-network to another to accomiplish what is suggested.
So then, in order to actually perform some sort of reprogramming activity, you would need to simply gain access to the software programming system, which in addition to looking for physical vehicle states (propulsion system NOT active, etc), there is also a Seed and Key scheme.
There is no random hacking of vehicles going on. It just isnt' happening. And if someone is actually demonstrating *true* hacking of vehicles, they are only doing so because they have very deep detailed access to design documentation...or they spent a hell of a lot of time and resources to prove a far-fetched and obvious concept (obvious in that all systems are vunerable....but vunerable does NOT equate to being probbable/dangerous/in danger....i.e. the sun is vunerable to being exploded by an insanely massive alien weapon....but that is not a dangerous concept because: 1. we know of know powerful alien life and 2. the energy of the weapon would be improbable.)