Flaws in Tesla Model X Could Let Attackers Use Bluetooth to Steal Cars
Apple Security Chief indicted in bribery scheme, 4.2M users records leaked from Peatix, E-Land Group shuts down stores due to ransomware, Amazon's massive surveillance in Europe revealed, much more
(If you like the new version of Metacurity in this newsletter format, please consider signing up for a premium subscription, which gives you access to the archives and more goodies. We need your support if we are going to continue to thrive. Thank you for your consideration.)
Also, plug, plug, check out my latest column in CSO Online on the new IoT security law just passed by Congress.
A collection of security vulnerabilities in both Tesla Model X cars and their keyless entry fobs that can be exploited by any car thief who manages to read a car's vehicle identification number and comes within fifteen feet of the car was discovered by Lennert Wouters, a security researcher at Belgian university KU Leuven. Wouters’ heist cost only $300 in hardware. His method could allow a hacker to rewrite the firmware of a key fob via Bluetooth connection, lift an unlock code from the fob, and use it to steal a Model X in just a matter of minutes. Wouters said he informed Tesla of the problems in Augus…
Keep reading with a 7-day free trial
Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.