{"id":56882,"date":"2024-09-30T03:45:15","date_gmt":"2024-09-30T03:45:15","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/"},"modified":"2024-09-30T03:46:25","modified_gmt":"2024-09-30T03:46:25","slug":"kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/","title":{"rendered":"Kias can be hijacked with just a phone and plate number \u2022 The Register"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div id=\"body\">\n<p><span class=\"label\">Infosec In Temporary<\/span> Put away that screwdriver and USB charging cable \u2013 the most recent option to steal a Kia simply requires a cellphone and the sufferer&#8217;s license plate quantity.<\/p>\n<p>Sam Curry, who <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/01\/07\/car_hacking_ferrari_account\/\" rel=\"noopener\">previously demonstrated<\/a> distant takeover vulnerabilities in a spread of manufacturers \u2013 from Toyota to Rolls Royce \u2013 discovered this vulnerability in autos as outdated as mannequin yr 2014. The mess means the vehicles could be geolocated, turned on or off, locked or unlocked, have their horns honked and lights activated, and even have their cameras accessed \u2013 all remotely.<\/p>\n<p>The vulnerability additionally uncovered victims&#8217; private particulars \u2013 title, cellphone quantity, e-mail, and bodily tackle \u2013 and let attackers add themselves as invisible secondary customers to the automobile.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\">\n        <noscript><br \/>\n            <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt=\"\"\/><\/a><br \/>\n        <\/noscript>\n    <\/div>\n<p>The difficulty originated in a single a Kia internet portals utilized by dealerships. Lengthy story brief and a hefty little bit of API abuse later, Curry and his band of far-more-capable <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.youtube.com\/watch?v=DJA7jDF7bLE\">Kia Boyz<\/a> managed to register a faux vendor account to get a legitimate entry token, which they have been then ready to make use of to name any backend vendor API command they needed.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><\/a><br \/>\n            <\/noscript>\n        <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\">\n                <noscript><br \/>\n                    <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                        <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><\/a><br \/>\n                <\/noscript>\n            <\/div>\n<\/p><\/div>\n<p>&#8220;From the sufferer&#8217;s facet, there was no notification that their automobile had been accessed nor their entry permissions modified,&#8221; Curry famous in his writeup. &#8220;An attacker may resolve somebody&#8217;s license plate, enter their VIN via the API, then monitor them passively and ship lively instructions like unlock, begin, or honk.&#8221;<\/p>\n<p>Curry&#8217;s group developed a <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.youtube.com\/watch?v=jMHFCpQdZyg\">smartphone tool<\/a> that automated the method, however did not launch it. Not that it could matter a lot, actually: Curry famous that Kia has fastened the problem, and he is verified the exploit not works.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>&#8220;Automobiles will proceed to have vulnerabilities,&#8221; Curry famous. &#8220;In the identical method that Meta may introduce a code change which might permit somebody to take over your Fb account, automotive producers may do the identical on your automobile.&#8221;<\/p>\n<div class=\"boxout\">\n<p><strong>Crucial vulnerabilities of the week: One other Ivanti exploit within the wild<\/strong><\/p>\n<p>It has been a busy few weeks in Ivanti exploit land. After placing a <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/09\/20\/patch_up_ivanti_fixes_exploited\/\" rel=\"noopener\">CVSS 9.4 path traversal vulnerability<\/a> within the Identified Exploited Vulnerability catalog on September 20, CISA added <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/09\/24\/cisa-adds-one-known-exploited-vulnerability-catalog\">another one<\/a> simply seven days later.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-7593\">CVE-2024-7593<\/a> is rated 9.8 and means variations Ivanti Visitors Supervisor aside from 22.2R1 or 22.7R2 have an issue meaning a distant attacker may bypass the authentication necessities of the product\u2019s administrator panel.<\/p>\n<p>Not nice for such a vital piece of software program \u2013 we might advocate making certain you are on a kind of protected variations ASAP.<\/p>\n<\/div>\n<h3 class=\"crosshead\">UK citizen charged with hacking firms to steal monetary secrets and techniques<\/h3>\n<p>The US Securities and Trade Fee filed fees towards a UK citizen for hacking public firms previous to their earnings bulletins to steal data used to earn money within the inventory market.<\/p>\n<p>Robert Westbrook was accused of hacking 5 unnamed US companies previous to their earnings bulletins on at the very least 14 events between January 2019 and August 2020, incomes round $3.75 million with the data he accessed.<\/p>\n<p>The SEC mentioned Westbrook obtained entry by resetting the passwords on accounts belonging to senior executives. Particulars weren&#8217;t supplied exterior of the SEC indictment indicating &#8220;4 of the 5 hacked firms used the identical password reset portal software program.&#8221;<\/p>\n<p>Westbrook allegedly took appreciable steps to hide his id, together with utilizing nameless emails, VPN companies, and cryptocurrency \u2013 however none of that seems to have mattered.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33Zvoey94mEMrMDdLlMzI_0AAAABQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>&#8220;The Fee&#8217;s superior knowledge analytics, crypto asset tracing, and expertise can uncover fraud even in circumstances involving refined worldwide hacking,&#8221; defined SEC crypto belongings and cyber unit performing chief Jorge Tenreiro.<\/p>\n<p>Westbrook was apprehended by UK authorities and is awaiting extradition to the USA, the place he is additionally going through <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.justice.gov\/usao-nj\/pr\/uk-national-charged-multimillion-dollar-hack-trade-fraud-scheme\">charges<\/a> from the Division of Justice. If convicted on the DoJ fees he may resist 65 years in jail.<\/p>\n<h3 class=\"crosshead\">Namebay ransomwared<\/h3>\n<p>Monaco-based Namebay, one of many oldest area registrars round, has admitted to falling prey to a ransomware assault.<\/p>\n<p>In keeping with <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.namebay.com\/\">Namebay<\/a>, it was hit on September 21, knocking its mail and website hosting and API companies offline. Different companies remained on-line, although the positioning&#8217;s DNS system did go down for a number of hours throughout incident restoration.<\/p>\n<p>As of Friday, September 27, Namebay&#8217;s mail internet hosting remains to be not working correctly, although the registrar mentioned it stood up various messaging infrastructure on Wednesday. Namebay clients will not be routinely in a position to entry the service; nevertheless, they might want to <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2024\/09\/30\/infosec_in_brief\/mailto:activationboitemail@namebay.com\">message<\/a> Namebay on to have particular mailboxes activated. The corporate mentioned the method is ongoing, and that workers could be readily available over the weekend to make sure activations continued.<\/p>\n<p>Namebay hasn&#8217;t specified whether or not any knowledge was exfiltrated through the assault, or when regular service might be restored.<\/p>\n<h3 class=\"crosshead\">How to not succeed at ransoming vital infrastructure<\/h3>\n<p>Crucial infrastructure programs like <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/12\/04\/iran_terrorist_us_water_attacks\/\" rel=\"noopener\">water treatment plants<\/a> have develop into in style targets for nation-state backed risk actors \u2013 and the occasional fool, too.<\/p>\n<p>Metropolis officers within the small city of Arkansas Metropolis, Kansas, final week took to native information to reassure residents {that a} cyber assault on the town&#8217;s water therapy plant might have knocked programs offline, however there wasn&#8217;t something to fret about.<\/p>\n<p>&#8220;Residents can relaxation assured that their consuming water is protected, and the Metropolis is working beneath full management throughout this era,&#8221; metropolis supervisor Randy Frazer declared, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.ctnewsonline.com\/breaking_news\/article_354f006e-79ca-11ef-a13b-b7b92137c375.html\">per<\/a> native information outlet the Courier Traveler.<\/p>\n<p>The explanation locals needn&#8217;t fear is that, whereas the assault took the plant&#8217;s management programs offline, it additionally prevented attackers from additional tampering with the infrastructure. Frazer instructed the Courier Traveler that no metropolis or buyer data was compromised.<\/p>\n<p>The id of the attackers stays a thriller, native information reported, and Arkansas Metropolis authorities didn&#8217;t plan to pay the requested ransom.<\/p>\n<h3 class=\"crosshead\">TikTok ejects Russian media<\/h3>\n<p>TikTok has ejected a number of media retailers linked to the Russian authorities amid rising concern over misinformation from Moscow within the run-up to the US election.<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.tiktok.com\/transparency\/en-us\/us-election-hub\">accounts<\/a> related to Rossiya Segodnya and TV-Novosti have been eliminated final week &#8220;for participating in covert affect operations on TikTok which violates our Group Tips.&#8221; This comes weeks after the Division of Justice seized a number of web sites and charged two RT (Russia Right this moment) workers for <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2024\/09\/05\/biden_cracks_down_on_putins\/\" rel=\"noopener\">spreading Russian propaganda on social media<\/a>.<\/p>\n<p>TikTok closed three accounts &#8220;representing a media firm, its founder, and a faked information outlet&#8221; within the days after the DoJ&#8217;s strikes, although it did not determine who the accounts have been affiliated with.<\/p>\n<p>Like TikTok, Meta took <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.nbcnews.com\/news\/us-news\/meta-bans-rt-russian-disinformation-rcna171402\">similar action<\/a> to ban RT accounts after the DoJ&#8217;s report, citing the actions violated its guidelines on overseas interference exercise.<\/p>\n<p>Individually this week, the US Director of Nationwide Intelligence <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.dni.gov\/index.php\/fmic-news\/3998-election-security-update-20240923\">claimed<\/a> Russia continues to be essentially the most prolific in its use of AI to meddle in US politics. \u00ae<\/p>\n<\/p><\/div>\n<p><script async src=\"\/\/www.tiktok.com\/embed.js\"><\/script><br \/>\n<br \/><iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2024\/09\/30\/infosec_in_brief\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infosec In Temporary Put away that screwdriver and USB charging cable \u2013 the most recent option to steal a Kia simply requires a cellphone and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":46612,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-56882","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kias can be hijacked with just a phone and plate number \u2022 The Register - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kias can be hijacked with just a phone and plate number \u2022 The Register - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-30T03:45:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-30T03:46:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/car.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Kias can be hijacked with just a phone and plate number \u2022 The Register\",\"datePublished\":\"2024-09-30T03:45:15+00:00\",\"dateModified\":\"2024-09-30T03:46:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/\"},\"wordCount\":1141,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/car.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/\",\"name\":\"Kias can be hijacked with just a phone and plate number \u2022 The Register - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/car.jpg\",\"datePublished\":\"2024-09-30T03:45:15+00:00\",\"dateModified\":\"2024-09-30T03:46:25+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/car.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/car.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2024\\\/09\\\/30\\\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kias can be hijacked with just a phone and plate number \u2022 The Register\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kias can be hijacked with just a phone and plate number \u2022 The Register - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/","og_locale":"en_US","og_type":"article","og_title":"Kias can be hijacked with just a phone and plate number \u2022 The Register - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2024-09-30T03:45:15+00:00","article_modified_time":"2024-09-30T03:46:25+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/car.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Kias can be hijacked with just a phone and plate number \u2022 The Register","datePublished":"2024-09-30T03:45:15+00:00","dateModified":"2024-09-30T03:46:25+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/"},"wordCount":1141,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/car.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/","url":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/","name":"Kias can be hijacked with just a phone and plate number \u2022 The Register - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/car.jpg","datePublished":"2024-09-30T03:45:15+00:00","dateModified":"2024-09-30T03:46:25+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/car.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/car.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2024\/09\/30\/kias-can-be-hijacked-with-just-a-phone-and-plate-number-the-register\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Kias can be hijacked with just a phone and plate number \u2022 The Register"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/56882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=56882"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/56882\/revisions"}],"predecessor-version":[{"id":56883,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/56882\/revisions\/56883"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/46612"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=56882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=56882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=56882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}