Live Chat Software

Remote Exploitation of an Unaltered Passenger Vehicle

Remote Exploitation of an Unaltered Passenger Vehicle

You've heard all the civilian buzz about summit speaker Chris Valasek's and Charlie Miller's 2014 Jeep Cherokee Hack. But have you read their 91-page whitepaper outlining their research and explaining their process in granular detail? Polish up on the details of Chris's hack in advance of his session at the event.


Please note: That all fields marked with an asterisk (*) are required.



This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.