Remote Exploitation Of An Unaltered Passenger Vehicle

Discussion in 'News Aggregator' started by Packet Storm, 26 Apr 2017.

  1. Packet Storm

    Packet Storm Guest

    This paper outlines the research into performing a remote attack against an unaltered 2014 Jeep Cherokee and similar vehicles that results in physical control of some aspects of the vehicle. Hopefully this additional remote attack research can pave the road for more secure connected cars in our future by providing this detailed information to security researchers, automotive manufacturers, automotive suppliers, and consumers.

    Continue reading...
     

Share This Page

Loading...