March 19, 2024
Sin comentarios
A cybersecurity researcher has managed to compromise a Tesla vehicle through a Man-in-the-Middle attack. In a YouTube video he shows the process.
The process involves creating a WiFi network at the charging station, looking for users to be able to connect and thus obtain Tesla account credentials, since when connecting to this network, the login data is requested.
Then, With those credentials, the legitimate Tesla app is logged in and the vehicle is added, since the car is not required to be open or the phone inside it to set up what Tesla calls “Phone Key”.
Fountain: Bleeping Computer
More news
Vimeo sufre una brecha de datos
Read more »
Booking.com suffers a data exfiltration of bookings
Read more »
La franquicia de gimnasios Basic-Fit sufre una exfiltración de datos
Read more »
New wave of scams using AI-cloned voices
Read more »
Una brecha en la Comisión Europea salpica unas treinta instituciones
Read more »