Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Car hacking enters remote exploitation phase

Car hacking enters remote exploitation phase


Threatpost - (International) Researchers at the Black Hat 2014 conference presented findings that showed how attackers could remotely compromise the systems of certain vehicles that integrate Bluetooth, radio, or other communications methods into their sensors and controls. Among the most vulnerable types of systems the researchers found were systems that can control vehicles automatically, such as active lane control, self-parking, and pre-collision systems


Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at:

Last Updated: 27 May 2016 10:21:15