Automotive Fleet
MenuMENU
SearchSEARCH
Enter keywords to search across all content
NewsAugust 7, 2015

Tesla Model S Hacked, Security Patch Issued

A pair of researchers hacked a Tesla Model S battery-electric vehicle to test its security capabilities, although Tesla has distributed a security patch to all Model S owners, Wired reported.

Read More →
NewsJuly 31, 2015

GM's OnStar Hacked, Volt Engine Started

A hacker has found a security vulnerability in General Motors' OnStar mobile app that allowed him to locate a Chevrolet Volt, unlock the vehicle, and start its engine.

Read More →
NewsJuly 24, 2015

Video: FCA US Recall to Address Hacking Risk

In response to a report of vehicle hacking via the Uconnect system, FCA US is updating software for about 1.4 million vehicles in the U.S.

Read More →
Ad Loading...
NewsJuly 22, 2015

Jeep Cherokee Hacked by Security Researchers

Two hackers successfully took control of a 2014 Jeep Cherokee while it was in motion, according to a report by Wired.

Read More →
NewsJune 1, 2015

House Committee Probing Auto Cybersecurity

The U.S. House Energy and Commerce Committee has posed a series of questions to 17 automakers, in hopes of evaluating the auto industry’s ability to mitigate cybersecurity threats.  

Read More →
NewsFebruary 10, 2015

Senator Worries Vehicles Are Vulnerable to Hackers

New vehicles that have fully adopted Bluetooth and wireless internet technology leave themselves open to hackers, according to a new report from U.S. Senator Edward J. Markey (D-Mass.).

Read More →
Ad Loading...
Market Trendsby Mike AntichAugust 16, 2011

Vehicle Remote Starting and Door Unlocking Can be Hacked

Recently, a security systems consultant demonstrated that the technology used to link a car to a smart phone can be hacked to gain control of these vehicle functions. The demonstration showed that the wireless communication protocols between a server and a vehicle can be intercepted allowing a hacker to “reverse engineer” the encrypted software protocols. Once the software protocols are replicated, a hacker can maliciously communicate with a vehicle to unlock doors or start the engine.

Read More →