TechHive: When Tesla Model S logs on, will hackers happily pounce?

TechHive
TechHive helps you find your tech sweet spot. We guide you to products you'll love and show you how to get the most out of them. 
Launch your idea today.

Type FRIENDS in our "How did you hear about us" box for a free LaunchBit Startup Guide and turn your dream into reality!
From our sponsors
thumbnail When Tesla Model S logs on, will hackers happily pounce?
Aug 31st 2013, 18:50, by Jon Gold

It's the curse of the connected car once it's linked to the Internet, it's, well, on the Internet. In the case of the Tesla Model S, this means that malicious hackers could, in theory, control some functions of the vehicle and even track it without the owner's knowledge.

Tesla offers Android and iPhone apps for Model S owners, which can be used to check the vehicle's battery, track its location and status, and tweak several other settings, like climate control and the sunroof. It can also be used to unlock the doors on the Model S.

Dell senior engineer George Reese says the REST API used by Tesla to provide access for Android and iPhone apps has several fairly serious security flaws, which could offer a way in for unscrupulous hackers.

According to an article written by Reese for O'Reilly, Tesla appears to have broken from accepted best practice when designing the API for the Model S.

To read this article in full or to leave a comment, please click here

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Previous
Next Post »