Once you have those resources at your disposal, it's not hard to get into a vehicle. You only need about $600 in equipment (a Raspberry Pi, two radios, batteries and a portable drive to store the key tale) and 1.6 seconds to get through.

Thankfully, this attack shouldn't work now. Model S cars made from June onward have tougher encryption that won't fall prone to the attack, and a software update lets customers with older cars switch to more secure fobs if they want. Also, Tesla introduced an optional feature in August that requires you to enter a PIN code on the touchscreen to start the vehicle -- intruders might get in, but they won't be going anywhere. KU Leuven said it informed Tesla about the issue in August 2017, but the automaker noted that it took a while to verify the research, create the fix and roll it into the company's manufacturing systems.

The issue isn't that there's an active security risk, then. Rather, it's that the fobs (produced by Pektron) were vulnerable to start with. And Tesla is just the most prominent affected brand, not the only one. The team believes that machines from McLaren, Karma and Triumph might be susceptible, although their key systems haven't been tested. These findings are ultimately a reminder to the entire automotive industry that security is increasingly important for modern cars, especially with something as important as the key.