
How millions of Kia cars could be tracked
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
21 articles
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
In this week’s edition Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss the company’s security predictions for 2018.
In today’s Kaspersky Lab’s Transatlantic Cable podcast, Dave and Jeff discuss Germany destroying smartwatches, Detroit community Wi-Fi and hacked cars.
Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
“Good-faith” car hacking and mobile device “jailbreaking” are now on their way to becoming legal in the U.S. The Library of Congress’ triennial exemptions to the anti-circumvention rules within the Digital Copyright Millennium Act (DCMA), released on October 27th.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
It’s up to the manufacturers to change the approach to designing modern hi-tech equipment. As we have written before, security should come first. It must be taken in account at the design level, not added later.
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
Let’s imagine the things we would have to leave behind as a brand new world of driverless cars is evolving at a full speed (besides the enjoyment of driving itself)
There is a flood of appliances which could be connected – and some are connected – without a second thought as to whether or not it’s necessary or secure.
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
Car hacking is a topic that resurfaces regularly. Still, a remote takeover of a car’s system is not a reality – yet. It may become a reality without the proper approach to the security of a car’s on-board systems.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Car hacking is back and Charlie Miller and Chris Valasek no longer have to plug their computers into the cars to make them do their bidding.
We begin our synopsis of this week by looking forward to next week when Microsoft will – at long last – discontinue its support of the once ubiquitous, forever vulnerable,
Kaspersky Daily editor Brian Donohue sat down with Dr. Charlie Miller, the notorious Apple hacker and Twitter security engineer, and Chris Valasek, the director of security intelligence at IOActive, for
Whether or not it is possible to hack a car depends almost entirely on the kind of car you drive. I, for example, drive a 1998 Honda Accord, and I’m