Attacking Automobiles: Inside a Connected Car’s Points of VulnerabilityDavid BissonOct 19, 2015Vulnerability Management