Hacker claims he can control more than 25 Tesla electric cars

2260

All the technology that electric cars from Tesla bring opens the door to security issues. These have already been detected in the past and even resolved, but new relevant and worrying situations do not cease to arise.

A new situation has now emerged and reports that a hacker guarantees access to 25 Tesla electric cars around the world. This ensures having the ability to control these cars remotely and without limits.

He is only 19 years old, but he seems to have managed to accomplish something that many have tried without success. From what he revealed on his Twiteer account, David Colombo ensures that he has access to more than 25 Tesla electric cars spread across 13 countries.

And he guarantees that in addition to being able to remotely access the cars, it is also possible for him to control these vehicles and precisely know their location. It has not yet publicly revealed how it manages to do this, but it has given this information to Tesla for evaluation.

Based in Germany, David Colombo also revealed that the problem is associated with the way the information needed to connect to electric cars. This is stored by Tesla insecurely and thus becomes simple to access and consult.

BUT: You can now buy a Tesla car with Bitcoin

From what he published on Twitter, the control of the cars he managed does not allow interfering with driving. Still, it has the ability to turn on the entertainment system or the lights of Tesla's electric cars. You can also unlock vehicles without using the key and disable security systems.

Security issue investigated by Tesla

A post made later revealed that he had already contacted Tesla's security team and that they were already investigating the problem. The creator of electric cars should soon contact and will give updates that arise on this failure of vehicles.

This is yet another safety situation affecting Tesla's electric cars that was not expected. All the associated technology that can be accessed remotely opens the door to any hacker, who can thus assume remote control.

LEAVE AN ANSWER

Please enter your comment!
Please enter your name here