Originally Posted by Jeepster910
I also think that the Bluetooth has to be paired to another Bluetooth.
Thus you have to accept the connection.
That is assuming this Cherokee has secure Bluetooth, which is basic.
The scenario they envision is a compromised cell phone deliberately paired through BT.
FYI - I do data security for a living. I understand their theory and it isn't at all implausible. It was recently discovered that hackers compromised a bunch of items such as "smart" TVs and fridges and had them function in a botnet to send spam messages.
I am curious whether the researchers were actually able to demonstrate a functioning hack via a compromised device or if this is purely theoretical. Because there's a big difference between the former and the latter.