Researchers Used a Drone and a WiFi Dongle to Break Into a Tesla

Home > Technology
By Yoongi in Technology
Updated 3 years ago

A hardcoded password was just the start. In the information age, releasing any new connected product will draw the attention of people who want to test the limits of just how secure it is. In fact, most large enterprises not only predict this, but offer big bounty programs to encourage "white hat" hackers to find, validate, and responsibly disclose vulnerabilities before bad actors can exploit them in the wild. This, of course, also applies to connected cars like Tesla.

researchers-used-a-drone-and-a-wifi-dongle-to-break-into-a-tesla