<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: A New Wireless Hack Can Unlock 100 Million Volkswagens &#124; WIRED</title>
	<atom:link href="http://www.epanorama.net/blog/2016/08/12/a-new-wireless-hack-can-unlock-100-million-volkswagens-wired/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/08/12/a-new-wireless-hack-can-unlock-100-million-volkswagens-wired/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 07 Apr 2026 06:14:56 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/12/a-new-wireless-hack-can-unlock-100-million-volkswagens-wired/comment-page-1/#comment-1567064</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 17 Oct 2017 12:27:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45281#comment-1567064</guid>
		<description><![CDATA[Unlocking a Subaru with a Raspberry Pi, a 433MHz Radio, and an Unpatched Exploit
The Subaru #fobrob exploit
https://blog.hackster.io/unlocking-a-subaru-with-a-raspberry-pi-a-433mhz-radio-and-an-unpatched-exploit-de0f88dc7c2c]]></description>
		<content:encoded><![CDATA[<p>Unlocking a Subaru with a Raspberry Pi, a 433MHz Radio, and an Unpatched Exploit<br />
The Subaru #fobrob exploit<br />
<a href="https://blog.hackster.io/unlocking-a-subaru-with-a-raspberry-pi-a-433mhz-radio-and-an-unpatched-exploit-de0f88dc7c2c" rel="nofollow">https://blog.hackster.io/unlocking-a-subaru-with-a-raspberry-pi-a-433mhz-radio-and-an-unpatched-exploit-de0f88dc7c2c</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/12/a-new-wireless-hack-can-unlock-100-million-volkswagens-wired/comment-page-1/#comment-1523614</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 14 Nov 2016 13:56:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45281#comment-1523614</guid>
		<description><![CDATA[Rohde &amp; Schwarz Show Test System for Remote Keyless Entry Systems
http://www.eetimes.com/document.asp?doc_id=1330814&amp;

At electronica 2016, Rohde &amp; Schwarz is presenting a universal solution for testing vehicle keys and the associated electronic control units with their various wireless technologies. Thanks to the modular and scalable approach, the test system can be used to test at the printed board and device level in all product phases — from development to product qualification to mass production.

Modern vehicle key systems, such as remote keyless entry (RKE) and passive entry/passive start (PEPS) systems, use a variety of wireless communications standards to transmit encoded signals. In the past, both LF frequencies (e.g. 125 kHz) and UHF frequencies (e.g. 433 MHz) as well as a magnetic compass system that works in three spatial axes (e.g. 21 kHz) were used to locate the key in or near the vehicle.

Using ultra-wideband (UWB) radio, the latest generation of key systems only needs one wireless standard in the non-licensed frequency range between 3.1 and 10.6 GHz. Time of flight (TOF) measurement prevents the relay attacks used to steal vehicles. TOF also makes it possible to determine the location of the key. Some manufacturers use near-field communications (NFC) to use a smartphone as a digital key.

Rohde &amp; Schwarz is showing how a new system solution can help manufacturers meet their testing requirements. The demonstration consists of a fully automatic R&amp;S TS7124AS shielded test box]]></description>
		<content:encoded><![CDATA[<p>Rohde &amp; Schwarz Show Test System for Remote Keyless Entry Systems<br />
<a href="http://www.eetimes.com/document.asp?doc_id=1330814&#038;amp" rel="nofollow">http://www.eetimes.com/document.asp?doc_id=1330814&#038;amp</a>;</p>
<p>At electronica 2016, Rohde &amp; Schwarz is presenting a universal solution for testing vehicle keys and the associated electronic control units with their various wireless technologies. Thanks to the modular and scalable approach, the test system can be used to test at the printed board and device level in all product phases — from development to product qualification to mass production.</p>
<p>Modern vehicle key systems, such as remote keyless entry (RKE) and passive entry/passive start (PEPS) systems, use a variety of wireless communications standards to transmit encoded signals. In the past, both LF frequencies (e.g. 125 kHz) and UHF frequencies (e.g. 433 MHz) as well as a magnetic compass system that works in three spatial axes (e.g. 21 kHz) were used to locate the key in or near the vehicle.</p>
<p>Using ultra-wideband (UWB) radio, the latest generation of key systems only needs one wireless standard in the non-licensed frequency range between 3.1 and 10.6 GHz. Time of flight (TOF) measurement prevents the relay attacks used to steal vehicles. TOF also makes it possible to determine the location of the key. Some manufacturers use near-field communications (NFC) to use a smartphone as a digital key.</p>
<p>Rohde &amp; Schwarz is showing how a new system solution can help manufacturers meet their testing requirements. The demonstration consists of a fully automatic R&amp;S TS7124AS shielded test box</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/12/a-new-wireless-hack-can-unlock-100-million-volkswagens-wired/comment-page-1/#comment-1507007</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 19 Aug 2016 08:04:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45281#comment-1507007</guid>
		<description><![CDATA[Arduino + Software Defined Radio = Millions of Vulnerable Volkswagens
http://hackaday.com/2016/08/18/adruino-software-define-radio-millions-of-vulnerable-volkswagens/

As we’ve mentioned previously, the integrity of your vehicle in an era where even your car can have a data connection could be a dubious bet at best. Speaking to these concerns, a soon-to-be published paper (PDF) out of the University of Birmingham in the UK, states that virtually every Volkswagen sold since 1995 can be hacked and unlocked by cloning the vehicle’s keyfob via an Arduino and software defined radio (SDR). 

The process isn’t exactly as simple as putting together $40 of electronics and walking away with a vehicle. The would-be thief must be close in order to detect the fob’s unique key — although they only need to do so once for that vehicle! — as well as reverse-engineer the other half of the code from the vehicle’s internal network. Exploiting HiTag2’s vulnerabilities to unlock the vehicle can be achieved within a minute by a well-prepared thief. [Garcia] and his team note that only the VW Golf 7 has been spared from this exploit.]]></description>
		<content:encoded><![CDATA[<p>Arduino + Software Defined Radio = Millions of Vulnerable Volkswagens<br />
<a href="http://hackaday.com/2016/08/18/adruino-software-define-radio-millions-of-vulnerable-volkswagens/" rel="nofollow">http://hackaday.com/2016/08/18/adruino-software-define-radio-millions-of-vulnerable-volkswagens/</a></p>
<p>As we’ve mentioned previously, the integrity of your vehicle in an era where even your car can have a data connection could be a dubious bet at best. Speaking to these concerns, a soon-to-be published paper (PDF) out of the University of Birmingham in the UK, states that virtually every Volkswagen sold since 1995 can be hacked and unlocked by cloning the vehicle’s keyfob via an Arduino and software defined radio (SDR). </p>
<p>The process isn’t exactly as simple as putting together $40 of electronics and walking away with a vehicle. The would-be thief must be close in order to detect the fob’s unique key — although they only need to do so once for that vehicle! — as well as reverse-engineer the other half of the code from the vehicle’s internal network. Exploiting HiTag2’s vulnerabilities to unlock the vehicle can be achieved within a minute by a well-prepared thief. [Garcia] and his team note that only the VW Golf 7 has been spared from this exploit.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/12/a-new-wireless-hack-can-unlock-100-million-volkswagens-wired/comment-page-1/#comment-1505957</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Aug 2016 07:18:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45281#comment-1505957</guid>
		<description><![CDATA[Millions of Volkswagens Can Be Unlocked By Hackers
http://spectrum.ieee.org/cars-that-think/transportation/safety/millions-of-volkswagens-can-be-unlocked-by-hackers?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+IeeeSpectrum+%28IEEE+Spectrum%29&amp;utm_content=FaceBook

Millions of Volkswagen cars could in principle be unlocked from a distance by hackers, according to a new report. It’s one more strike against a German company that’s had more than its share of bad news, what with VW’s admitted cheating on diesel-emissions tests.

But there’s plenty of bad news to go around: the report notes that many models from other companies have vulnerabilities of their own. And the problem is worse with older cars, designed before carmakers gave much thought to cybersecurity.

Kasper told the BBC that the researchers informed Volkswagen of the vulnerability in late 2015 and that the company was taking steps to mitigate the problem. But he said there are &quot;at least 10 more, very widespread&quot; vulnerabilities affecting other car brands, which the researchers won’t publish until the manufacturers have had time to do something about them.

The report describes two weaknesses.]]></description>
		<content:encoded><![CDATA[<p>Millions of Volkswagens Can Be Unlocked By Hackers<br />
<a href="http://spectrum.ieee.org/cars-that-think/transportation/safety/millions-of-volkswagens-can-be-unlocked-by-hackers?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+IeeeSpectrum+%28IEEE+Spectrum%29&#038;utm_content=FaceBook" rel="nofollow">http://spectrum.ieee.org/cars-that-think/transportation/safety/millions-of-volkswagens-can-be-unlocked-by-hackers?utm_source=feedburner&#038;utm_medium=feed&#038;utm_campaign=Feed%3A+IeeeSpectrum+%28IEEE+Spectrum%29&#038;utm_content=FaceBook</a></p>
<p>Millions of Volkswagen cars could in principle be unlocked from a distance by hackers, according to a new report. It’s one more strike against a German company that’s had more than its share of bad news, what with VW’s admitted cheating on diesel-emissions tests.</p>
<p>But there’s plenty of bad news to go around: the report notes that many models from other companies have vulnerabilities of their own. And the problem is worse with older cars, designed before carmakers gave much thought to cybersecurity.</p>
<p>Kasper told the BBC that the researchers informed Volkswagen of the vulnerability in late 2015 and that the company was taking steps to mitigate the problem. But he said there are &#8220;at least 10 more, very widespread&#8221; vulnerabilities affecting other car brands, which the researchers won’t publish until the manufacturers have had time to do something about them.</p>
<p>The report describes two weaknesses.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/12/a-new-wireless-hack-can-unlock-100-million-volkswagens-wired/comment-page-1/#comment-1505723</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 15 Aug 2016 11:14:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=45281#comment-1505723</guid>
		<description><![CDATA[The English University of Birmingham researchers revealed last week, held in Austin USENIX security conference that millions of Volkswagen Group cars can easily go in without a lock being broken

The car does not, of course, must start from a simple radio signal, but the theft of objects inside the car will become very easy. 

According to VW the fault is not included in the following car models: Golf, Tiguan, Touran and Passat. For other models VW are working on repairs.

Source: http://etn.fi/index.php?option=com_content&amp;view=article&amp;id=4838:radiotekniikalla-sisaan-kaikkiin-volkswageneihin&amp;catid=13&amp;Itemid=101]]></description>
		<content:encoded><![CDATA[<p>The English University of Birmingham researchers revealed last week, held in Austin USENIX security conference that millions of Volkswagen Group cars can easily go in without a lock being broken</p>
<p>The car does not, of course, must start from a simple radio signal, but the theft of objects inside the car will become very easy. </p>
<p>According to VW the fault is not included in the following car models: Golf, Tiguan, Touran and Passat. For other models VW are working on repairs.</p>
<p>Source: <a href="http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=4838:radiotekniikalla-sisaan-kaikkiin-volkswageneihin&#038;catid=13&#038;Itemid=101" rel="nofollow">http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=4838:radiotekniikalla-sisaan-kaikkiin-volkswageneihin&#038;catid=13&#038;Itemid=101</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
