Gone in 20 Minutes: using laptops to steal cars

So technology = insecurity? An instance below …
Becharey Beckham ki gaari chori hogayi … Enjoy the article :slight_smile:

High-tech thieves are becoming increasingly savvy when it comes to stealing automobiles equipped with keyless entry and ignition systems. While many computer-based security systems on automobiles require some type of key — mechanical or otherwise — to start the engine, so-called ‘keyless’ setups require only the presence of a key fob to start the engine.

The expert gang suspected of stealing two of David Beckham’s BMW X5 SUVs in the last six months did so by using software programs on a laptop to wirelessly break into the car’s computer, open the doors, and start the engine.

More here

Re: Gone in 20 Minutes: using laptops to steal cars

reminded me of the movie “Gone in 60 Seconds” with Angelina and Nick Cage :k:

Re: Gone in 20 Minutes: using laptops to steal cars

^ key word filters lagaye huey hain kia? a reply within 3 mins of the initial post ... cheetah :)

Re: Gone in 20 Minutes: using laptops to steal cars

^ kuch aisa hi hai yaar, wait kar raha tha tu kabb post karega

Re: Gone in 20 Minutes: using laptops to steal cars

Genie man, I think 5watery's job is to scan GS constantly. And its not just the computer forum either.

Re: Gone in 20 Minutes: using laptops to steal cars

^ hmm… makes me wonder if 5abi placed a backdoor on my machine ..
oh no.. i just scanned my %windir% folder; symantec detected

Symantec Security Response Article

W32.5AbiPindFar@W@y

W32.5abiPindFar@W@y is a very friendly worm that may open a back door and track gupshup surfing of a particular user.

Type: Worm (friendly)
Infection Length: 111,111 bytes

Systems Affected: Stop being nosy

Threat Assessment
Wild

* Number of infections: 1*1^46+(0-2^5) 
* Number of sites: nahhh
* Geographical distribution: North America
* Threat containment: When there's a will ...  complete the sentence.
* Removal: Chor na yar

Technical Details
When W32.5abiPindFar@W@y is executed, it performs the following actions:

  1. Creates the following file:
    %System%\5abi32.exe

  2. Adds the value:
    “Windows System” = "\5abi32.exe
    to the registry subkeys:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

  3. Changes the values
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main
    “Window Title”=“Give me firefox or give me death”
    “Start Page”=“http://www.spreadfirefox.com

Removal Instructions
-Did you complete the sentence? Anyway, our engineers are working hard to create a removal tool … we appreciate your patience.
p.s. do you YAHOO?

Re: Gone in 20 Minutes: using laptops to steal cars

^ LOL now thats funny. Should have posted it in jokes mang :rotfl: