It looks like most things can be hacked according to the White hat hacker event Pwn2Own 2023. Windows 11, Tesla, Ubuntu, and macOS hacked at Pwn2Own 2023 – BleepingComputer You can add Adobe Reader and Microsoft SharePoint and more to the list… Do you think you need take your cyber …
Tesla hacking… and a practical solution
Hacking the technology in a Tesla car is almost becoming its own sub-genre of cyber-attacks. This one exploits the technology used in the electronic key fob. NFC Relay Attack on TESLA Model Y (ioactive.com) A relay attack is where the hacker stands behind you in the petrol station queue, although …
False positives something we all have to deal with – Including Microsoft. At least read this post for its two Hitchhiker’s Guide to the Galaxy references!
Our team often get desperate calls from clients, who are expecting an urgent email which they know has been sent, but they have not received it. The support staff usually quickly check the anti-virus, advanced threat protection, the firewall or other barrier/filtering protection (depending on what the client has) to …
The Rolling Pwn Attack – Honda drivers beware! UPDATED
Here is another research paper outlining how the wireless security car manufacturers are suing to secure our vehicles is woefully inadequate. The vulnerability often comes from the technology being used, having been developed for another task altogether. This time it is Honda – check to see if your car is …
Continue reading “The Rolling Pwn Attack – Honda drivers beware! UPDATED”
How to unlock a Tesla that does not belong to you!
This is not a complete “how to steal the car”, but it does illustrate how, when tools are used for things they were not originally designed for, there can be unforeseen security issues as cyber criminals hunt for flaws, for example the internet for shopping and banking, and NFC and …
Continue reading “How to unlock a Tesla that does not belong to you!”