Tag Archive for: entry

Tesla Model 3, Model Y’s keyless entry system can be compromised, shows hacker


A cybersecurity researcher noted that tinkering with Tesla’s keyless entry system relies on Bluetooth Low Energy (BLE) protocol.

By : HT Auto Desk
|
Updated on:
17 May 2022, 07:27 AM

File photo of Tesla Model Y 
File photo of Tesla Model Y 

While Tesla’s keyless entry system may be one of its most convenient features, it also has a loophole. A cybersecurity researcher has demonstrated to Bloomberg how the technology can be compromised, allowing thieves to unlock and drive off with certain models of electric vehicles from Tesla. According to Sultan Qasim Khan, principal security consultant at security firm NCC Group, hackers can redirect communications between a car owner’s mobile phone, or key fob, and the car, especially in case of Tesla Model 3 and Model Y.

Outsiders can fool the keyless entry system into thinking the owner is located physically near the vehicle. Khan, however, clarified that the hack is not specific to Tesla but he demonstrated the hack on one Tesla’s car models. He stated that the result of his tinkering with Tesla’s keyless entry system relies on Bluetooth Low Energy (BLE) protocol.

(Also read | Tesla puts India entry plan on hold after deadlock on EV tariffs: Sources)

However, there is no evidence that thieves have actually used the hack to improperly access Tesla vehicles. The researcher further noted that to fix the issue, the carmaker would need to alter its hardware and change its keyless entry system. The revelation comes after another security researcher, David Colombo, revealed a way of hijacking some functions on Tesla vehicles, such as opening and closing doors and controlling music volume.

During the demonstration to Bloomberg, Khan conducted a so-called relay attack, in which a hacker uses two small hardware devices that forward communications. To unlock the car, he placed one relay device within roughly 15 yards of the Tesla owner’s smartphone or key fob and a second, plugged into his laptop, near to the car.

The technology utilized custom computer code that Khan had designed for Bluetooth development kits, which are sold online for less than $50. The hardware needed, in addition to the custom software, costs roughly $100, and can also be…

Source…

Fears of new omicron Covid variant prompts Israel to ban entry to foreigners


Israel will on Sunday become the first country to ban the entry of all foreigners as the world races to understand and contain the new worrying variant of Covid-19 that emerged in southern Africa. The government also promised to use controversial phone-tracking technology to track and locate cases of the new omicron variant.

While no cases of the new variant have been detected in the United States, the nation’s leading infectious disease expert, Dr. Anthony Fauci, told NBC News that mutations displayed by omicron indicate that it may be highly transmissible and able to escape the body’s immune response, including the protection rendered by antibodies induced by the vaccines.

“You don’t want to frighten the American public but when something occurs that you need to take seriously, you take it seriously and you do whatever you can to mitigate against that,” Fauci said. 

Travelers wearing protective face masks arrive at the Ben Gurion Airport near Tel Aviv on Sunday.Ariel Schalit / AP

“If ever there was a reason for unvaccinated people to get vaccinated, and for those who have been vaccinated, when you time comes up, to go and get a booster shot,” he added. 

The U.S. has restricted travel from South Africa and seven neighboring countries, effective Monday. 

But experts, including Fauci, have told NBC News the variant could already be in the U.S.

“It’s already here,” NBC News’ medical contributor Dr Kavita Patel said. “We know from previous variants that by the time we pick it up in Africa and the European Union, it’s already likely.”

While there is still little understanding about omicron and how virulent it can be, a South African doctor who treated early cases of the variant told the BBC Sunday that countries could be “panicking unnecessarily” and the symptoms she had seen were “extremely mild.”

Dr Angelique Coetzee said she had first encountered the variant in patients who had fatigue, aches and pains, but no cough or change in sense of smell or taste, the BBC said. But she acknowledged that understanding of the variant was still developing.

Dr Angelique Coetzee, chair of the South African Medical Association, said she had first encountered the variant in patients…

Source…

Arizona AD apologizes for football stadium entry delays, promises improvement for NAU game


Following a less-than-desirable debut of new security measures and a mobile ticketing system at Arizona Stadium, UA athletic director Dave Heeke has issued a formal apology.

“I want to apologize to those who were unable to fully enjoy that exceptional experience,” Heeke said in his Wildcat Wednesday newsletter. “We fell short in our obligation to provide you that experience. For that we sincerely apologize. We did not deliver.”

There were long delays entering the stadium for last week’s home opener against San Diego State, resulting in a very sparse crowd (other than in the Zona Zoo student section) at kickoff. By the time most of the announced crowd of 39,097 was in its seats the Wildcats were down 21-0, ultimately falling 38-14 for their 14th consecutive loss.

Heeke said the athletic department has been working to identify all the things that went wrong and come up with ways to fix them in time for this Saturday’s game against NAU. He said there will be additional staff at each gate and new queueing procedures will be in effect

“Our commitment remains to provide an outstanding game day experience for fans, and that means working tirelessly to resolve issues and deficiencies,” Heeke said. “These important elements of the fan experience will be better when we welcome you all for Saturday’s home football game versus Northern Arizona.”

Though Heeke said the mobile ticketing went well, he noted that ways for fans to help speed things up include making sure their tickets are up on their phone when they approach the gate, and he recommended fans enter at the gate closest to their seats.

Source…

Effectively closing entry gates for hackers: How strong authentication protects against ransomware


Ransomware is a problem that is here to stay and that will in time become an even bigger issue – that is a fact that is clear to everyone involved in IT security. According to the international study “The State of Ransomware”, more than half of all organizations have experienced a ransomware cyberattack in 2020. Once hit, giving in to criminal demands or restoring the system wholesale is an expensive strategy, if it can be deemed a strategy at all. True risk mitigation should first ask what the main attack vectors exploited by this type of malware actually are. This is the only solution that not only staves off the problem of ransomware, but ideally minimizes the risk permanently. 

The three main attack vectors of ransomware  

Attack vector number 1 – the technology: As in many other attack scenarios, hackers exploit vulnerabilities and backdoors of infrastructure for their ransomware attacks in order to smuggle malware into a system. Infrastructure is especially vulnerable when it is based on unpatched systems. For example, the well-known Wannacry ransomware – which gained notoriety by taking out entire universities and hospitals – directly targets computers running outdated versions of Microsoft Windows. It exploits a known programming flaw in the SMB implementation to create crashes and persistent bluescreens (hence the name “Eternal-Blue”), spying on computers and locking users out of systems. The Wannacry ransomware attack shows just how virulent the problem of unpatched computers is. The attack spread to 150 countries and infected more than 230,000 computers. 

Source…