![]() ![]() ![]() When taking Uber or Lyft, is your ride-sharing data buckled up? Uber, self-driving cars, and the high cost of connectivity (opinion) How to balance safety and privacy with a car tracker How to protect what your car knows about you (opinion) How Uber drives a fine line on security and privacy ![]() Hackable software in the driver’s seat: The current state of connected car security This hack could take control of your Ford (A Tesla outage over Labor Day locked some Phone Key users out of their cars for a short time.) The identifier allows the Tesla app (for the Android or iOS mobile operating systems) to unlock and start the car whenever the phone is near the vehicle, without having to use the car’s physical key fob. While he was “playing around” with the car and its app, he noticed that by design, it constantly beams out an iBeacon unique identifying number over Bluetooth Low-Energy, or BLE. (He named his after the famous robot-car KITT, the vehicle star of the Knight Rider TV show.) And he’s developed an app to prove it.īluetooth security expert Martin Herfurt, based near Salzburg, Austria, discovered what he describes as an “epic self-pwn” on Tesla’s part, in June, after purchasing a new black Model 3 sedan. TOKYO-A security researcher has discovered that anybody with a smartphone or other Bluetooth-compatible device can pick the location of a Tesla Model 3 out of the ether. ![]()
0 Comments
Leave a Reply. |