For these other key fobs, there wasn't a master key that they could obtain. Instead they exploited the fobs' old and weak HiTag2 encryption algorithm. By capturing between four and eight encrypted ...
Is your keyless remote safe? Connected cars face increasing threats as new technologies present hackers and thieves with additional ways to access vehicles. One vulnerability, though, involves older ...