· 360 refers to Tesla application storage flaw attacker can remotely control the vehicle

The computer can make Tesla's car light up and even let the car whistle. This is not a film shot in The Matrix, but a scene in real life. Yesterday, Beijing Youth Daily reporter saw such a demonstration operation at the world's first safe geek carnival focusing on smart life and the first GeekPwn and XCon conference. However, 360 security experts said that such exploits are more difficult to use, and the owners do not have to panic.
The person doing this on site is a geek. He also controls smart toilets, tablets, game console watches, etc. through computers. "Everything can be broken," the geek said.
Yesterday, 360 professional team also released a report that the study found that the Tesla Model S-type automotive application process has design flaws. The attacker exploited this vulnerability to remotely control the vehicle, unlocking, whistling, flashing, opening the sunroof, and enabling the sunroof to open while the vehicle is in motion.
360 has recently submitted relevant vulnerability details and solution recommendations to Tesla, and expressed willingness to provide technical support for Tesla to fix related vulnerabilities. It is reported that this is the first time a professional security company in the world has discovered a vulnerability in the Tesla application.
So does the existence of such a loop mean that Tesla owners must face a dangerous driving environment? In this regard, 360 chief scientist, 360 mobile security research institute director Jiang Xuxian said that the probability of successfully using such vulnerabilities to carry out attacks is very low, Tesla owners do not have to worry too much about their own vehicles will be unidentified attacks. In view of the current hidden danger, the ordinary car owner can effectively avoid the potential hazard by turning off the remote access switch in the Tesla setting. Previously, foreign media reported that hackers used Tesla's 6-digit password to remotely control the car, but the technical threshold for attacking smart cars is still high.
The industry believes that the discovery of this vulnerability has brought the discussion on the safety of smart cars to the agenda again. Based on new energy technologies and human-computer interaction technologies, especially the widespread application of vehicle networking technology, smart cars represented by electric vehicles Tesla are becoming a new fashion and lifestyle, but the public’s safety hazards to smart cars And the preventive measures are poorly understood. (Reporter Wu Linlin)
The latest news Tesla is willing to cooperate with security researchers The SyScan360 forward-looking information security conference to be held in Beijing will use the Model S model as the target of the hacking contest. In response to this incident, Tesla China issued a special statement entitled "Products and Safety" yesterday afternoon. Although Tesla did not participate in the conference and was not a sponsor of the competition, Tesla supported the idea of ​​providing An environment where responsible security researchers help identify potential vulnerabilities.
The statement said that Tesla attaches great importance to vehicle and customer safety and is committed to working with security researchers to verify, reproduce, respond to and fix vulnerabilities in reports based on the company's security vulnerability reporting policy. "We believe this activity may help identify potential vulnerabilities, and we encourage security researchers to participate in the game in a responsible manner." Tesla said in a statement yesterday that the company will investigate any legal loopholes reported. And take quick action to respond and fix.

Chaff Cutter Machine

Chaff Cutter Machine,Silage Chaff Cutter Machine,Chaff Cutter Chopper Machine,Chaff Feed Cutter Machine

HUNAN JINSONG MACHINERY CO., LTD , https://www.sheller.nl