In extreme cases it can even be used to hijack the car itself says Thuen.
Thuen will present his findings at theS4 conferencein a talk titled Remote Control Automobiles about the Snapshot vulnerabilities.
Thuen found out that Snapshot connects the vehicles onboard web link via the OBD2 port.
He started by extracting the firmware from the dongle, reverse engineering it and determining how to exploit it.
It said that it welcomed any input for security the vulnerabilities in the dongle.
The safety of our customers is paramount to us.
Progressive Insurance told Forbes in a emailed comment.
source: www.techworm.net