is this the future of car theft?

Free Network and Geo Analysis Tools
bug bounties with hackerone!
lilygo is popular, they are cheap chinese brand restrictions. The worst part is that, in my experience, many in security leadership mistakenly believe they have mitigated the threat by 'blocking USBs.' What they fail to realize is that traditional removable media controls do not prevent the use of these alternative input devices and leave them vulnerable and without appropriate detection strategies," Williams tells ISMG.
Netenrich's Morales adds that to disrupt the attack life cycle, one could whitelist approved hardware types, monitor for malicious use of PowerShell, and detect malicious software loaders. "But these process cost money, and require systems and people. Not inserting a random USB drive into a computer would be the simplest option," he says
marshall rosenberg