
Cybersecurity expert Daniel Regalado will demonstrate at DefCon 26 a vulnerability in tablet-style in-vehicle displays such as that found in the Tesla Model X; it is not known what vehicle Regalado and his team claim to have successfully hacked. Photo courtesy Tesla Inc.
MOUNTAIN VIEW, Calif. — Connected device management and security provider Zingbox announced new research that shows how a car’s driver can be subject to cybersecurity attacks through the car’s “infotainment” system, the embedded operating system powering the iPad-looking displays found on many recent new vehicles.
Daniel Regalado, Zingbox’s principal security researcher, has agreed to demonstrate the vulnerability at the DefCon 26 Car Hacking Village in Las Vegas tomorrow. In a statement released today, the company revealed that Regalado teamed with independent researchers Gerardo Iglesias and Ken Hsu to break into a car’s infotainment system and reverse-engineer its main components with one goal in mind: to infect the operating system with malware and prove the system could be controlled remotely through SMS messages, using the driver’s own phone to compromise their personal data and safety.












