Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

Stealing Luxury Cars Has Never Looked So Easy

Stealing Luxury Cars Has Never Looked So Easy

FromCYBER


Stealing Luxury Cars Has Never Looked So Easy

FromCYBER

ratings:
Length:
28 minutes
Released:
Feb 13, 2020
Format:
Podcast episode

Description

Luxury cars, like everything else in this entire world, including sex toys, pacemakers, firearms, the electric grid, and ISIS, can be hacked. But most people aren't hackers, which is why a device that can automatically hack a keyless entry vehicle by the push of a button is quite useful for car thievesThe so-called “relay attack” is ideal for the era of increasingly digitized vehicles, requires something called a “keyless repeater” to fake the signal of the keys to a targeted car and ultimately gain entry. After that, it’s as easy as what Whiz Khalifa once said in his famous song "Black & Yellow’:" No keys, push to start.And the keyless repeater is sold online for a few thousand dollars by a man who goes by the alias “EvanConnect” who shared a video of the whole process with Motherboard reporter Joseph Cox. It turns out that his device can specifically be used to hack snazzy cars made by upscale companies like Mercedes Benz, Rolls Royce, and Fiat. This week on CYBER, Cox is back on the show to tell us about this whole sketch relay attack and how it all works. For information regarding your data privacy, visit acast.com/privacy
Released:
Feb 13, 2020
Format:
Podcast episode

Titles in the series (100)

Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.