He can remote control 25 Tesla cars, but he’s not a thief: he just wants to teach a lesson

It’s not the first time it’s happened, it probably won’t be the last. But it is an excellent example of how everything is connected and that we must always take care not to leave digital doors open to anyone.

He knows david columbo, a 19-year-old German cybersecurity researcher who told, on Twitter, how he can remotely access 25 Tesla cars located in 13 countries.

May windows up and down, unlock doors, change music and more (although not driving the car remotely). Even know if there is someone in the car or not. And -he clarifies- it is not a problem of Tesla’s infrastructure, but of how remote access works.

Tesla cars – like many others – are computers on wheels connected to the internet; the idea of ​​access to the network is to facilitate its location, turn on the air conditioning to cool it down and that it is at a comfortable temperature when we get on, things like that. They also use the connection to receive software updates, check traffic status, download games (a feature not without controversy), and much more.

But if the owners do not deal with changing passwords and adjusting the security levels of the cars, the same way they do with other devices. In this case, according to Colombo, the problem lies in how the software stores information necessary to access the cars, and what checks it performs to validate remote access. In fact, the investigator showed Bloomberg screenshots of a conversation with one of those affected, in which he showed the other person how he could honk the horn without authorization.

Chinese researchers had already shown something similar with another Tesla a few years ago, as well as with a Jeep Cherokee, among other vehicles. And before, a site showed how it was possible to access 73,000 cameras connected to the Internet simply because the owners had not changed the original password.

It is not clear how Colombo managed to gain access to these twenty cars, but the message it wants to leave is clear: the owners of devices with internet access must take care to activate all the necessary security protocols, to prevent a third party from accessing them. , because they represent an invasion of privacy and a danger to our intimacy, physical and mental.

Source link


Helen Hernandez is our best writer. Helen writes about social news and celebrity gossip. She loves watching movies since childhood. Email: Phone : +1 281-333-2229

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker