Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Tesla's keyless car vulnerable to a spoofing attack
Researchers in the UK have found out a method to spoof/copy the tesla key fab. While found by a research team, if fell into the wrong hands or the black market it would allow tesla cars to be stolen rather easily. The article suggests to put your pin in as another layer of security to prevent the possibility of this happening.
You must be logged in to reply to this topic.