Probably most of us use Bluetooth wireless connectivity without really thinking about it. In my case just this morning, I have been out in my car, my iPhone connected automatically and I listened to some music, at this moment I am again listening to music from my phone via a …
Is you car on this list? Mine is.
My other car is not a Porche – but car wireless security (or lack of it) is something we all need to be aware of: Ferrari, BMW, Rolls Royce, Porsche and more fix vulnerabilities giving car takeover capabilities – The Record by Recorded Future I will continue to use my …
AirTag Abuse and Cyber Stalking
A gadget the size of a 10p coin, the AirTag was intended to help people find their keys. Instead it has facilitated a boom in terrifying behaviour from abusers Anna Moore – The Guardian 5 September 2022 AirTags – a great idea but a privacy nightmare. Worse than that, they …
The Rolling Pwn Attack – Honda drivers beware! UPDATED
Here is another research paper outlining how the wireless security car manufacturers are suing to secure our vehicles is woefully inadequate. The vulnerability often comes from the technology being used, having been developed for another task altogether. This time it is Honda – check to see if your car is …
Continue reading “The Rolling Pwn Attack – Honda drivers beware! UPDATED”
Another example of using Bluetooth for something it was not intended for
Earlier this week, I wrote about the Bluetooth weaknesses that would allow someone to drive off with your Tesla: How to unlock a Tesla that does not belong to you! – Smart Thinking Solutions Here is a research paper, from UC San Diego, that examines how the cryptographic anonymity that …
Continue reading “Another example of using Bluetooth for something it was not intended for”