Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

You can squeeze a Tesla by Hacking its Android app


Security experts of Promon, security firm of Norwegian app, are able to completely control a vehicle belonging to Tesla, including finding location of the parked car, opening its door, along with enabling the keyless driving functionality. Dearth of security in the smartphone app of Tesla opened door to each and every types of exploits. Promon discovered cyber-attack provides more functionality to the one exposed by the Keen Security Labs in another late September hack.

The new method involving the official Android app of Tesla, may help to make attack simpler or difficult to prevent. theinquirer.net posted on November 25th, 2016, stating that a company known as Promon has bad information on this, as it said that the vulnerabilities in app make this entire thing crackable joke which will allow somebody else other than driver to do driving.

"Our researchers have demonstrated that because of lack of security in the Tesla smartphone app, cyber criminals could take control of the company's vehicles, to the point where they can track and locate the car in real-time, and unlock and drive the car away unhindered." This type of hack provides criminals complete control over the vehicle, and provides more functionality to the one exposed by another late September hack.

Cybercriminals make the hack work by setting up the Wi-Fi hotspot, which might be nearer to the public Tesla charging point. Once the users of Tesla logged in and then visit page, the advert targeting owners of car appears and offers incentive, like free coffee or meal. By clicking on the link and then download accompanying app, the hackers are able to have access to mobile device of the user, thus allowing them attack Tesla app and then obtain the passwords and usernames.

They have many recommendations for Tesla software chaps that include recommendation of creating an application which is less vulnerable to exploitation. Other guidance is also available. There are more than 200 Million code lines in today's connected car, not to mention the smartphone apps that are linked to car.

ยป SPAMfighter News - 12/1/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next