I really liked this article. I have covered various highly involved cyber attacks over the last few months, deepfakes, hacking cars, air–gap attacks but as it describes in this article, you can use technology to steal those credentials or you can just ask nicely for them: Phishing works so well …
Tesla hacking… and a practical solution
Hacking the technology in a Tesla car is almost becoming its own sub-genre of cyber-attacks. This one exploits the technology used in the electronic key fob. NFC Relay Attack on TESLA Model Y (ioactive.com) A relay attack is where the hacker stands behind you in the petrol station queue, although …
Your security keys are supposed to be secret – don’t copy and paste them from the internet
Here is another car security story, but this time it appears it is laziness or carelessness: Software dev cracks Hyundai encryption with Google search • The Register
Ransomware highlights from Bleeping Computers
There are a rush of ransomware stories on Bleeping computers, mainly high profile organisations being hit, not only with crypto-malware but being blackmailed over data exfiltrated by the threat actors. Automotive supplier breached by 3 ransomware gangs in 2 weeks (bleepingcomputer.com) Hacker uses new RAT malware in Cuba Ransomware attacks …
Continue reading “Ransomware highlights from Bleeping Computers”
Do you know what data you are sharing when you use your car
This is an interesting article about your privacy, if you have a connected car, by Jon Keegan and Alfred Ng over on the The Markup website. Who Is Collecting Data from Your Car? – The Markup I have a modern car and read this with interest. The section “Anonymization and Aggregation” …
Continue reading “Do you know what data you are sharing when you use your car”