Heads up to Kia owners/potential buyers: Today, a group of independent security researchers revealed that they'd found a flaw in a web portal operated by the carmaker Kia that let the researchers reassign control of the internet-connected features of most modern Kia vehicles—dozens of models representing millions of cars on the road—from the smartphone of a car’s owner to the hackers’ own phone or computer. By exploiting that vulnerability and building their own custom app to send commands to target cars, they were able to scan virtually any internet-connected Kia vehicle’s license plate and within seconds gain the ability to track that car’s location, unlock the car, honk its horn, or start its ignition at will.
reshared this
excited for the mastodon rise
in reply to BrianKrebs • • •Can we regulate this? Car owners should be able to physically depower all data radios in the car with the flick of a switch. Like, a physical switch that disconnects power from this part of the car.
I need a new car, and I cannot and will not buy one until this tracking shit is put to bed. Which means I'll probably have to buy a "classic" car at this point.
Fish Id Wardrobe
in reply to excited for the mastodon rise • • •1101base2
in reply to excited for the mastodon rise • • •Maybe not a flick of the switch but a specific fuse that controls all of these devices. Problem is most of this tech is so central to a card operation now it won't operate of it is missing...
excited for the mastodon rise
in reply to 1101base2 • • •Nicole Parsons
in reply to BrianKrebs • • •Beware of innocent seeming cables...
theverge.com/23321517/omg-elit…
counterespionage.com/malicious…
Malicious USB Cables | USB Hacking Cables | Murray Associates
Kevin D. Murray (Murray Associates TSCM)Jonathan Lamothe
in reply to Nicole Parsons • •zdnet.com/article/flying-this-…
like this
Nicole Parsons and T.J. Crowder like this.