Your daily selection of the hottest trending tech news!
According to Wired (This article and its images were originally posted on Wired September 10, 2018 at 01:09PM.)
Tesla has taken plenty of innovative steps to protect the driving systems of its kitted-out cars against digital attacks. It’s hired top-notch security engineers, pushed over-the-internet software updates, and added code integrity checks. But one team of academic hackers has now found that Tesla left its Model S cars open to a far more straightforward form of hacking: Stealthily cloning the car’s key fob in seconds, opening the car door, and driving away.
A team of researchers at the KU Leuven university in Belgium on Monday plan to present a paper at the Cryptographic Hardware and Embedded Systems conference in Amsterdam, revealing a technique for defeating the encryption used in the wireless key fobs of Tesla’s Model S luxury sedans. With about $600 in radio and computing equipment, they can wirelessly read signals from a nearby Tesla owner’s fob. Less than two seconds of computation yields the fob’s cryptographic key, allowing them to steal the associated car without a trace. “Today it’s very easy for us to clone these key fobs in a matter of seconds,” says Lennert Wouters, one of the KU Leuven researchers. “We can completely impersonate the key fob and open and drive the vehicle.”
- Got any news, tips or want to contact us directly? Feel free to email us: firstname.lastname@example.org.
To see more posts like these; please subscribe to our newsletter. By entering a valid email, you’ll receive top trending reports delivered to your inbox.