What You Should Know About the Honda Key Fob Vulnerability


As a cybersecurity writer, I’m more aware than the average person of the security risks with any connected device. So when I sat in my new car for the first time and saw all the different ways it linked to my phone or my home WiFi, more than a few red flags went up. I know that as cars get smarter, they become more susceptible to hackers who are searching for any potential vulnerability. One of the most recently announced attack vectors is the key fob for recent model Honda vehicles. 


Vehicle Vulnerabilities 


Most IoT or smart devices were never designed with cybersecurity in mind, but vehicles take that lack of security to a higher level, with piecemeal technologies developed by third-party companies. The same risks found in any connected device are found in a smart car. Threat actors have the opportunity to do almost anything, from stealing personal data to manipulating any of the different systems and sensors in the vehicle. But the most popular attack vector, at least for now, is the wireless key fob. 


Tesla cars have made news recently due to several different key-fob-related exploits. For example, a teenager found a vulnerability in an app that controls some basic functions like unlocking the vehicles or flashing the headlights. Meanwhile, a European researcher discovered Tesla’s near field communication (NFC) card that’s used like a key fob can easily be exploited by hackers, all because Tesla provides a 130-second window between unlocking the car and starting the engine.  


While Tesla vulnerabilities may get high-profile attention, key fob vulnerabilities are found in vehicles more commonly found in public parking lots, in neighborhood driveways and as part of corporate vehicle fleets. 


Rolling-PWN


The key fob attack ..

Support the originator by clicking the read the rest link below.