Hacking cars remotely – new example

Hacking continues in the mobile embedded world. See


Now one can wonder about the “reality” and importance of this hack, but it shows a continuing trend. As I collect information like this, the mobile/embedded security attacks of my book continue to seem important even as they need to evolve to address the new threats.

As cars and devices grow “smarter” this type of situation will continue to grow, and yet I most mobile/embedded testers seem to focus on verification of requirements. They are happy in the ignorance. Here is another data point to add to your “smarts”.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s