• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Tesla Hacked Again – Daily Security Byte

September 26, 2016 By Corey Nachreiner

Researchers have figured out how to remotely hack a car yet again. This time a Chinese security team called Keen found a vulnerability in Tesla’s onboard computer and entertainment system. If an attacker can trick a Tesla owner into connecting to an evil Wi-Fi Hotspot, and can get them to visit a malicious page from the onboard computer’s browser, they could exploit this flaw to take over many aspects of the car. The good news is Tesla has already sent an over-the-air (OTA) patch to all its customers, and the researchers haven’t disclosed the technical details for the flaws yet. Watch the video below to learn more, and to see some of the researcher’s hacks in action.

By the way, you may have noticed I was unable to post any daily videos last week, due to work travel and a very busy schedule. This particular video was from last week, but I haven’t had the time to blog about it until now. I will return to a more regular video schedule this week.

Episode Runtime: 3:02

Direct YouTube Link: https://www.youtube.com/watch?v=jUknoECpPqc

EPISODE REFERENCES:

  • Chinese researchers hack a Tesla Model S – Engadget
  • Keen Security’s blog on their Tesla hack – Tencent.com
  • Flaw allows hackers to brake a Tesla from 12mi away – TNW
  • Tesla quickly patches customers with an OTA update – Telegraph

— Corey Nachreiner, CISSP (@SecAdept)

Share This:

Related

Filed Under: Security Bytes Tagged With: Infosec news

Comments

  1. David Weston says

    September 26, 2016 at 11:16 am

    Hi Cory – glad you are back. You might need one of these for doing your videos!

    https://fancy.com/things/1245158801317830117/Mr.-Robot-fsociety-Mask

    Reply
    • Corey Nachreiner says

      November 17, 2016 at 1:41 pm

      Heh… I bought on of those long ago.. but it was so long ago that I bought it from a group that apparently WASN’T officially sanctioned. While I did get my mask, the company that sold it shutdown shortly after.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • Here Come The Regulations
  • Successfully Prosecuting a Russian Hacker

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use