Security News

Secure boot for UK electric car chargers isn't mandatory until 2023 – but why the delay?
2022-01-11 10:17

Electric car chargers will have to include secure boot and automatic network disconnection if unsigned software runs on the smart devices - but only from 2023, the British government has said. New security requirements for smart chargers won't be enforced until the last day of this year, according to government papers reviewed by The Register.

Honda cars in flashback to 2002 – “Can’t Get You Out Of My Head”
2022-01-08 19:53

Owners of Honda cars of a certain age - apparently somewhere between 10 and 16 years old - have spent the first few days of the New Year reporting a weird "Millennium bug style" problem. Apparently, for many cars that are a decade or so old, New Year's Day 2022 was ushered in with their in-car clocks.

Honda, Acura cars hit by Y2K22 bug that rolls back clocks to 2002
2022-01-05 23:01

Honda and Acura cars have been hit with a Year 2022 bug, aka Y2K22, that resets the navigation system's clock to January 1st, 2002, with no way to change it. Starting on January 1st, the date on Acura and Honda navigation system would automatically change to January 1st, 2002, with the time resetting to 12:00, 2:00, 4:00, or other times based on the model or possibly the region the car is located.

Apple AirTags Are Being Used to Track People and Cars
2021-12-31 15:52

Researchers now believe AirTags, which are equipped with Bluetooth technology, could be revealing a more widespread problem of tech-enabled tracking. Unlike similar tracking products from competitors such as Tile, Apple added features to prevent abuse, including notifications like the one Ms. Estrada received and automatic beeping.

Modern cars: A growing bundle of security vulnerabilities
2021-12-14 06:00

Cars are becoming increasingly smart and an extension to our mobile phones. What are the biggest vulnerabilities of today's modern cars?

Volvo Cars discloses security breach leading to R&D data theft
2021-12-10 18:07

"Investigations so far confirm that a limited amount of the company's R&D property has been stolen during the intrusion. Volvo Cars has earlier today concluded, based on information available, that there may be an impact on the company's operation."​​​​​​. Volvo said it notified relevant authorities after discovering the incident and is now investigating the data theft together with third-party experts.

Thieves Using AirTags to “Follow” Cars
2021-12-06 16:25

Since September 2021, officers have investigated five incidents where suspects have placed small tracking devices on high-end vehicles so they can later locate and steal them. Brand name "Air tags" are placed in out-of-sight areas of the target vehicles when they are parked in public places like malls or parking lots.

Pandemic-Influenced Car Shopping: Just Use the Manufacturer API
2021-12-03 20:09

Jason Kent, hacker-in-residence at Cequence, found a way to exploit a Toyota API to get around the hassle of car shopping in the age of supply-chain woes. First, some background: Many outlets have widely reported that manufacturers are putting 99 percent of a vehicle together, parking it in a lot somewhere and assuming the missing parts, like computer chips, will be available soon and they'll be able to make the engines run so the vehicles can be sold.

Some Tesla owners unable to unlock cars due to server errors
2021-11-19 22:30

Some Tesla owners worldwide are unable to unlock or communicate with their cars using the app due to an outage of the company's servers. Starting around 4 PM EST, Tesla owners have taken to social media reporting that the Tesla app is returning a "500 server error" when attempting to communicate with the car.

Intel chip flaw could enable attacks on laptops, cars, medical devices (CVE-2021-0146)
2021-11-15 16:30

Researchers uncovered a vulnerability in Intel Processors that could affect laptops, cars and embedded systems. The flaw enables testing or debugging modes on multiple Intel processor lines, which could allow an unauthorized user with physical access to obtain enhanced privileges on the system.