Advertisement
UK markets close in 6 hours 53 minutes
  • FTSE 100

    8,094.98
    +54.60 (+0.68%)
     
  • FTSE 250

    19,692.15
    -27.22 (-0.14%)
     
  • AIM

    754.54
    -0.15 (-0.02%)
     
  • GBP/EUR

    1.1673
    +0.0028 (+0.24%)
     
  • GBP/USD

    1.2523
    +0.0060 (+0.48%)
     
  • Bitcoin GBP

    51,045.55
    -2,251.45 (-4.22%)
     
  • CMC Crypto 200

    1,365.91
    -16.66 (-1.21%)
     
  • S&P 500

    5,071.63
    +1.08 (+0.02%)
     
  • DOW

    38,460.92
    -42.77 (-0.11%)
     
  • CRUDE OIL

    83.22
    +0.41 (+0.50%)
     
  • GOLD FUTURES

    2,337.70
    -0.70 (-0.03%)
     
  • NIKKEI 225

    37,628.48
    -831.60 (-2.16%)
     
  • HANG SENG

    17,284.54
    +83.27 (+0.48%)
     
  • DAX

    18,017.07
    -71.63 (-0.40%)
     
  • CAC 40

    8,065.25
    -26.61 (-0.33%)
     

Tesla acts after security experts hack Model S brakes

Security researchers have revealed how they managed to hack into a Tesla car and apply the brakes from 12 miles away.

The Chinese hacking experts took control of the vehicle using a malicious WiFi network and found they could also unlock the car door without a key, open the sunroof, trigger indicator lights and move the driver's car seat.

The group from the Keen Security Lab, part of Chinese internet giant Tencent (HKSE: 0700-OL.HK - news) , demonstrated their findings in a video posted on YouTube.

They only published details of the vulnerability after first making contacting Tesla and giving Elon Musk's electric car company time to develop a fix.

ADVERTISEMENT

Keen Security Lab said Tesla had taken a "proactive attitude" and that it took "actions to fix the issues efficiently".

Tesla said the researchers would be "rewarded" for uncovering the security bug.

In a statement to The Verge, the company said: "Within just 10 days of receiving this report, Tesla has already deployed an over-the-air software update (v7.1, 2.36.31) that addresses the potential security issues.

"The issue demonstrated is only triggered when the web browser is used, and also required the car to be physically near to and connected to a malicious WiFi hotspot.

"Our realistic estimate is that the risk to our customers was very low, but this did not stop us from responding quickly.

"We engage with the security research community to test the security of our products so that we can fix potential vulnerabilities before they result in issues for our customers.

"We commend the research team behind today's demonstration and plan to reward them under our bug bounty program, which was set up to encourage this type of research."