Homepage / Technology / Tesla gets hacked (again) by Chinese research group
Как Стать Стримером Казино%3F Что для Этого Нужно%3 Best Game Software How to Design Engaging and Effective Educational Events Winline Делает Разницу! Букмекерская Контора Winline Онлайн Ставки На Спорт Making Corporate Travel Arrangements Business Virtual Data Room Stock Market Tips For Beginners What to Look for in a VDR Provider Why You Need a Secure Data Room Learning in the Digital Age How to Apply For Business Loans VDR and Document Management Performance Management and HR Outsourcing Modern Business Integration How to Choose the Right Board Portal Software for Your Company How to Choose a Data Storage Room Why Startups Use a Data Room for Investors The Best Web Tools for Designers Use Cases For Using VDR Documents Subsidy Programs and Financing Innovative Technologies for Audit What Is Real Estate Management? Investment and Funds Inspiring Teaching Books What Are the Benefits of a Virtual Data Room? Startups and Business Ideas How to Improve Virtual Board Communication The Lego Company History Investing in the Biotech Industry Financial Startup Basics Jogue Por Dinheiro Actual Em Cassino Onlin Virtual Communication Methods for Remote Leaders How to Choose the Best VDR Providers How Successful Online Businesses Succeed How Business Experts Fuel Innovation and Create Competitive Edge The IT World and Business Deal Making Software and How it Can Help Your Business Virtual Data Room Software Types of Steel Materials and Their Uses Board of Directors Software Bonver Casino Cz Hrací Automaty S Bonusem Zdarm Magazyn Żużel Speedway W Polsce I Na Świeci What Is Logistics School? What Is the VDR for Acquisition? The Best Data Room Apps For Startups Best Practices for Creating an Effective Board Meeting Agenda How to Choose the Best Shareholders Online Platforms Ostdeutsche Biersorten Getting a Construction Management Degree How to Select an Online Data Room Provider Start Your Blog Without Investment What to Look for in a Board Room Provider Data Room Comparison – Which Data Room Is Right For Your Business? Zakłady Sportowe Online Autógrafo Bukmacherska 1xbe “Pin-up O Melhor Cassino Do Brasil Web Site Oficial ᐈ Jogar Caça-níquei Rotating Events in Our Time How to Choose the Best Business Software Choosing an Online Payment Processor Due Diligence Software Virtual Data Room Providers for M&A Due Diligence The Best Online Data Room Benefits of a Due Diligence Data Room Best Practices for Data Rooms Types of Corporate Governance What Is Virtual Data Storage? Benefits of Document Distribution Software The Benefits of a Data Room for Startups Effective Project Management Requires a Mix of Technical and People Skills Top 5 Free File Sharing Services Zakłady Sportowe Online Obstawiaj U Bukmachera Gg Be Speed Up Your Business Valuation With a Data Room How to Choose the Best Board Management Software for Business How to Write Effective Board Decision Papers Choosing Board Meeting Software The Benefits of Document Distribution Software Why Startups Need a VDR for Start-Up Virtual Data Room for Ipos and the IPO Process What is a Board Portal? What Industries Use Virtual Data Room? Advantages of a Data Room What Does a Board Room Provider Do? Data Room Analysis for Venture Capital Funding The Importance of Board Reporting Software Safe Uploading and Downloading Business Files How to Select the Best Board Management Software How to Organize the Work of a Company “gerçek Parayla En Iyi Slot Makineleri Ve Spor Bahisler Which is the Best Podcast For Stock Market Beginners? Virtual Data Room Facts How to Protect Confidential Documents for Boards Advantages of Online Meetings Business Issues to Consider When Choosing a Data Room Provider What Is a Data Room? Virtual Board Room Software Due Diligence Risk Factors How to Choose a Reliable Tool for Data Exchange test Users535352253 Board Software and VDR Programs Business Operations Management Software

Technology

Tesla gets hacked (again) by Chinese research group

For the second time, Chinese security researchers were able to hack a Tesla Model X, turning on the brakes remotely and getting the doors and trunk to open and close while blinking the lights in time to music streamed from the car’s radio — an effect they dubbed “the unauthorized Xmas show.”

The complex hack involved sending malicious software through the car’s web browser in a series of circuitous computer exploits. They were able to remotely control the car via both Wi-Fi and a cellular connection.

More from USA Today:
Brave queso lovers could save Chipotle
How I became a professional adventurer: Jedidiah Jenkins
Coke Zero out, Coca-Cola Zero Sugar in due to recipe change

The researchers informed Tesla of their discovery in June of this year and the company patched the vulnerabilities within two weeks, said Samuel Lv, director of the Keen Security Lab at Chinese tech giant Tencent.

In a statement, Tesla said it actively encourages this type of research so that it can prevent potential issues from occurring. The risk to customers from such exploits is very low and Tesla has not seen a single customer ever affected by it, the statement said.

This is actually the second year the team from Keen Security Lab in Shanghai managed to hack a Tesla and remotely engage its brakes.

“We informed Tesla of the vulnerabilities we found last year and they corrected them. This year our research found new vulnerabilities and we were able to reproduce the same remote control of the car,” said Sen Nie, lead researcher for the car hacking team at Keen Security Lab. He presented the research with colleagues Ling Liu and Wen Lu at a conference of security researchers here.

Nie emphasized that the work was complex and not easily replicated. He also said the researchers don’t believe Teslas are inherently more vulnerable than other cars.

Charlie Miller, the hacker who gained fame in 2015 for hacking a Jeep with fellow researcher Chris Valasek, attended the group’s presentation at the Black Hat conference Thursday.

“There are only three groups in the world who’ve successfully hacked cars. The University of Washington in 2010, me and Chris and now these guys. And they’ve done it twice,” he said.

The team that Nie leads is part of Tencent, sometimes called the Facebook of China because its mobile messaging apps have more than 930 million users. It is also the world’s largest publisher of video games.

In 2016 Tencent began to broaden its mission, adding security research and consulting. It launched Nie’s group focusing on automotive security so that it could work with China’s many companies that produce parts and systems for the global auto industry.

“A lot of OEMs don’t have the knowledge or background to deal with cybersecurity issues. We consult with them to help them evaluate the security of connectivity modules on cars,” said Lv.

Source: Tech CNBC
Tesla gets hacked (again) by Chinese research group

Comments are closed.