Commonalities in Vehicle Vulnerabilities
By IOActive
Added
This paper is a follow-up to IOActive’s 2016 report1 on vehicle vulnerabilities. The goal of this paper is to revisit the topic using data from the past two years (2016, 2017) and to compare this information to previous findings to analyze how the industry is progressing.
Tags
Vulnerability Threat actor Personal data Application security Availability Confidentiality Cyber-physical Data breach Disruption Mobile appTopic Map
