! Everyone in the car when done properly the heart, the hacker may be in a 1 2 mile away will be able to hijack your car, while the remote control for your brake system. The Cohen laboratory in the fall of Tesla Today many car companies are providing car electronic control system, from the instrument cluster to the steering wheel, from the brake and throttle, these are the system can be directly controlled. However, these automated electronic control system, while optimizing your driving experience, but also increases your attack risk. Recently, Tencent Cohen lab of security researchers to demonstrate how to use the car system software multiple vulnerabilities, the car remotely hijacked. Cohen lab said they discovered more security vulnerabilities to remotely hijack the Tesla Model S. Vulnerability description It is said that this is the first time the fall of the CAN bus, controlling the driving system of the vehicle network, to achieve the Tesla car's remote control. The CAN bus is equivalent to a car of the neural network, and its importance is self-evident. Although this is only a test of the Tesla Model S is 75D, but the Cohen lab, the researchers say they have reason to guess the other models of the Tesla will be affected by the vulnerability. Of course, researchers may also be able to remotely unlock the door of the car, take over a dashboard computer screen, activate the indicator and windscreen wiper, and even in the operation of the vehicle when the car the wing is folded. But to trigger the vulnerability requires that the owner use the car to connect to a malicious WIFI hotspots, but also to use the car on the WEB browser to trigger, the condition is still relatively demanding. Tesla official in receipt of a vulnerability report soon after they were repaired, and released wireless firmware update(v7. 1,2. 3 6. 3 1), gives security researchers the 1 million bug Bounty.