Subscribe / Renew |
|
Contact Us |
|
► Subscribe to our Free Weekly Newsletter |
Construction Bids
home | Welcome, sign in or click here to subscribe. | login |
August 6, 2015
DETROIT — When researchers at two West Coast universities took control of a General Motors car through cellular and Bluetooth connections in 2010, they startled the auto industry by exposing a glaring security gap.
Five years later, two friendly hackers sitting on a living room couch used a laptop computer to commandeer a Jeep from afar over the Internet, demonstrating an even scarier vulnerability.
. . .