![]() |
As technology progresses towards the Internet of Things (IoT), opportunities for hackers increase as well.
In China, the Internet security company Qihoo has claimed to have forged a way to remotely control many aspects of the Tesla Model S, which is considered to be one of the more secure cars in the world.
A flaw in the car reportedly allowed Qihoo to control multiple car functions remotely, as Forbes recently stated:
“Recently we have conducted a series of tests to evaluate the safety of Tesla. We discovered ways to remotely control the car’s lock, horn and flashing lights. We can also open the skylight while the car is in motion – so Tesla drivers, take caution, you can get totally soaked up when it is raining. More bombshells will be released at the SyScan360 Conference when we will rip the mysterious shroud of Tesla for you.”
In addition to the features mentioned above, Qihoo was able to manipulate the traction control system, energy recycling system, and car body stabilization system. Tesla has since announced that it will investigate and fix leaks in its security as long as companies such as Qihoo continue to report vulnerabilities.
AccelOps anomaly detection can determine anomalies on all connected devices. When such a discrepancy is recognized by the software, you can isolate the device(s) and analyze them to see whether malware is present. AccelOps’ pattern recognition will allow you to easily differentiate anomalies in your system from normal traffic and communication patterns.
Want help securing your network (even if you don’t have a Tesla)? Contact us; we’re here to help.