Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

By Deeba Ahmed
Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect…
This is a post from HackRead.com Read the original post: Attackers Can Unlock Tesla Cars and Smart… Continue reading Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

Is the Seed-And-Key Challenge-Response used in Automotive Security really secure?

As an Automotive Security Professional, my state of the art approach to implement a Secure Access would be to have an ECU generate a challenge (nonce + ID), forward it to the tester who can pass the challenge to the backend system which si… Continue reading Is the Seed-And-Key Challenge-Response used in Automotive Security really secure?

3rd-party flaws allowed teen hacker to track location of Tesla cars

By ghostadmin
The security researcher made a startling revelation that he could access more than 25 Tesla vehicles in around…
This is a post from HackRead.com Read the original post: 3rd-party flaws allowed teen hacker to track location of Tesla … Continue reading 3rd-party flaws allowed teen hacker to track location of Tesla cars

How Can the Trucking Industry Secure Their Telematics?

The trucking sector is essential to countless other industries. Without reliable transportation, supply chains would crumble, and companies and consumers would face shortages. With so much riding on it, it’s no wonder why the industry has fully embrace… Continue reading How Can the Trucking Industry Secure Their Telematics?