Previous Flipbook
Datasheet: Keystone
Datasheet: Keystone

Next Video
Ep. 4 – How does car software get secured?
Ep. 4 – How does car software get secured?

What actually happens when an attacker modifies the code of the embedded software within your connected car...