63 Articles
1 / 3
NEXT

Researchers printed up stickers to fool machine vision into thinking a stop sign was a speed limit sign.

A bid to force manufacturers to make cars and other devices more secure.

$22 worth of electronics is all it takes.

TORONTO - Software vulnerabilities in a Hyundai app that lets a car be started remotely made the company's vehicles susceptible to high-tech thieves for three months before the company fixed the bug in March, a cyber security firm said on Tuesday. Hyundai introduced a flaw in a Dec. 8 update to the mobile app for its Blue Link connected car software that made it possible for car thieves to locate vulnerable vehicles, unlock and start them, said Tod Beardsley, research director with cyber securi

Vehicle hacking has been around for years.

Wherever there are computers, there are hackers.

Bad boys, whatcha gonna do when BMW comes for you?

The hacker, who wanted $73,000 in bitcoin, was hacked back.

A ransomware attack by a hacker left Muni keeping its turnstiles open for free rides on Saturday.

Thieves used FCA DealerCONNECT software to carry out their crimes.

Over a six month period, a pair of hackers broke into and stole more than 30 vehicles in the Houston area.

It's not strictly hacking, it's recoding blank keyfobs, says FCA.

The senior manager of security architecture at FCA believes Jeeps weren't hacked per se.

According to police officers in Houston, TX, thieves are hacking into the electronic ignition systems in late-model Jeep Wranglers and Cherokees.

But proposed law doesn't discern between criminals, gearheads or researchers.

Car hackers may not want to mess with vehicles in and around the Motor City. A pair of Michigan lawmakers introduced legislation Thursday that would punish anyone who infiltrates a vehicle's electronic systems with penalties as harsh as life imprisonment.

UC Santa Barbara's student team created user-tracking "ghost cars."

Switching on the app's invisible mode shields the user from being seen until an update fixes the issue.

A hacker has managed to link up his Amazon Echo so that all he has to do is mutter a few words and his GMC will start up. Welcome to the future, kids.

Hacker claims Tesla retaliated with Firmware downgrade.

Hacker Jason Hughes leaks image of Tesla "P100D" badge, claims retaliatory Firmware downgrade and gets praised by Musk.

Like The EPA, DOT Officials Chill Hope For Protections In Copyright Law

Independent researchers have uncovered major cyber-security weaknesses and emissions scams, but the government agencies that benefit most don't appreciate the help.

Copyright Law Could Soon Prohibit Independent Vehicle Research

The three crises that rollicked the auto industry in recent months – a rising death toll related to the General Motors ignition-switch defect, the Jeep Cherokee hack and now the Volkswagen cheating scandal – all have one thing in common. Outsiders discovered the problems.

Giving New Meaning To Plugging In

A Fisker Karma community site reveals how to turn on additional driving modes for the extended-range plug-in vehicle.

Jeep is recalling 7,800 Renegades over concerns that hackers could exploit a flaw in cars equipped with the 6.5-inch infotainment screen.

Charlie Miller And Chris Valasek Head To Ride-Sharing Giant

Chris Valasek and Charlie Miller, the security researchers behind some of the most prominent car-hacking studies to date, are taking on their next automotive challenge.

Researchers Manipulated Brakes From A Smartphone

In the latest car-hacking exploit in a summer full of them, researchers from the University of California-San Diego say they've found a way to manipulate braking in a 2013 Chevrolet Corvette. The vulnerabilities may not be limited to that car.

GM believes that the vulnerability that allows hacking of its OnStar RemoteLink app is closed. While the company is trying to be proactive with keeping things secure, there's no guarantee against future incidents.

NHTSA is investigating Harman Kardon, which supplies Uconnect to FCA, to see if Harman Kardon's other infotainment systems are also vulnerable to hacking.

1 / 3
NEXT
Share This Post

Hacking Questions

There are no questions about this topic.
Be the first to ask!

From Our Partners