- Trump signed an ego tweet sheet for Tomi Lahren–and it features conspiracy theorists Wednesday 6:59 PM
- Attorneys say ICE deleted evidence pertaining to transgender asylum seeker’s death Wednesday 6:24 PM
- Everything you need to know about VSCO filter codes Wednesday 6:17 PM
- Are users prepared to pay for Gmail storage space? Wednesday 6:09 PM
- Facebook pledges $1 billion to fight housing crisis it helped create Wednesday 5:16 PM
- Lizzo officially credits ‘DNA test’ tweet writer on ‘Truth Hurts’ Wednesday 4:50 PM
- Pornhub takes down videos secretly filmed in a college women’s locker room Wednesday 4:15 PM
- Google Maps on iPhone now shows you speed traps Wednesday 3:47 PM
- Here’s why you’re seeing ‘rise and shine’ all over social media Wednesday 3:45 PM
- AOC grills Zuckerberg over false political ads on Facebook Wednesday 3:27 PM
- Fox News promotes pro-faith, anti-antifa film ‘The Reliant’ Wednesday 3:17 PM
- Cardi B to star in ‘Fast & Furious 9’ Wednesday 3:12 PM
- AOC on opening her DMs: ‘By this morning, it was trash’ Wednesday 2:26 PM
- The ending to Netflix’s ‘Eli’ has divided viewers Wednesday 2:07 PM
- Teen consumes ungodly amount of meat, becomes meme Wednesday 2:07 PM
Some 100 million Volkswagens are vulnerable to hackers who discovered key vulnerabilities that allow them to unlock the doors of the most popular cars on earth, according to a new research paper first reported by Wired.
University of Birmingham computer scientist Flavio Garcia was already widely known for working with colleagues to find major security flaws in Volkswagens last year that enabled hackers to quickly takeover a keyless car.
The new attack could result in the theft of anything kept in a car.
When you put the two attacks together, you have a recipe for getting into and driving off with a stolen car in less than 60 seconds—Nic Cage-caliber grand theft auto.
Actually, you don’t need to be as good as Nic Cage at all. A thief can pull this off with cheap equipment like a TI Chronos smart watch.
“The attacks are … highly scalable and could be potentially carried out by an unskilled adversary,” the research claims. “Since they are executed solely via the wireless interface, with a t least the range of the original remote control (i.e. a few tens of meters), and leave no physical trace, they pose a severe threat in practice.”
VW was told about the issues in 2015 and many car manufactures are using more secure chips of late.
Your Audi A1, however, is in trouble.
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.