Stealer logs: How hackers gain access to vehicle functions through stolen login dataTogether with ZDF WISO, we show how criminals can use stolen login data from stealer logs to locate, open and drive away cars.
Multifactor Authentication (MFA): Only as strong as the weakest link in the chainIn this article we are discussing multifactor authentication. The different kinds will be explained, as well as some examples of possible attacks.