News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Tesla Hack: Full access to all functions
B2B Cyber ​​Security ShortNews

With a hack, doctoral students from the TU Berlin and a security researcher were able to use all the premium functions of a Tesla that buyers normally have to unlock first: full entertainment, heated rear seats and more. The weak point is probably the new AMD-based infotainment system. The pre-announcement for BlackHat USA 2023 has it all: In a 40-minute contribution, three doctoral students from the TU Berlin and the security researcher Oleg Drokin want to show. How to hack into a Tesla's infotainment system (MCU-Z) and then unlock the premium features. Because buyers usually have to pay for heated rear seats or faster acceleration via a subscription to…

Read more

Tesla: Employee probably passed on 100 GB of data
B2B Cyber ​​Security ShortNews

According to a report by the Handelsblatt, a former Tesla employee claims to have stolen 100 GB of data and handed it over to the editors. Informat accuses Tesla of protecting its data and that of its customers too poorly. Tesla did not respond to the questions from the Handelsblatt, but only made its own statement. Apparently Tesla doesn't use protection technology like DLP - Data Leakage Prevention or it doesn't work very well. Tesla wrote to the Handelsblatt that a disgruntled employee had illegally stolen data from the group. A total of 100 GB...

Read more

Teslas as a dangerous data source?
Teslas as a dangerous data source?

Tesla's Model 3 have a so-called Sentry Mode. Cameras record the surroundings, film processes and determine the position. Tesla collects all data in a Dutch headquarters and stores it there. Is this a dangerous data source if Tesla's properties are recording secret services or military areas? The data stored by Tesla on the Model 3 is certainly interesting for data thieves, as many Teslas film in sentry mode and note the position. Even the Munich police are said to have used the data in one case to arrest a con artist. Many official…

Read more

Bluetooth Hack – Millions of cars like Tesla or mobile devices at risk
Bluetooth hacked - millions of cars, devices and locking systems at risk

NCC Group performs the world's first link-layer-relay attack (hack) on Bluetooth Low Energy and uncovers vulnerabilities in proximity-based mechanisms, which NCC Group says also kills millions of cars such as the Tesla 3 or Y, as well as mobile devices and locking systems are at risk. Global cyber security expert NCC Group announced today that it has carried out the world's first link layer relay attack on Bluetooth Low Energy (BLE). BLE is a standard protocol for data exchange between devices used by companies for short-range authentication to protect millions of vehicles, smart locks...

Read more

Vulnerabilities in the ConnectPort X2e device
Fireeye News

In late 2019, the Red Team at Mandiant, a FireEye unit, discovered a number of vulnerabilities in Digi International's ConnectPort X2e device. Mandiant's research focused on the SolarCity (now Tesla) renamed X2e device, which is used to collect data in private solar systems. A typical setup provides that SolarCity provides a customer with a gateway (the X2e device) and this is connected to the Internet via an Ethernet cable in the customer's home network. In this way, the device can interpret and send energy measured values. Hackers have managed to remotely ...

Read more