Let me repeat that: a year after the vulnerability, that could be used to kill people, Chrysler recalls the affected cars.
Miller and Valasek reported the issue to Chrysler to give the car maker time to come up with a patch before the Wired story went live.
The patch of course had to be thoroughly tested to ensure that it didn't contain any dangerous bugs, but still, issuing it a year after the vulnerability was first outed seems complacent.
The cat's well and truly out of the bag now, and bad people know that some newer cars can be tampered with remotely.
Read more from Juha Saarinen:
• UFB making sense to Netflix 4K adopters
• Apple Music - streaming and screaming at the bugs
• Nokia's colossal mistake
We don't know which ones yet, but if you have a car with wireless connectivity of some sort, even Bluetooth, that could be linked to internal systems if it's not isolated on its own network, I'd ask the service people at the garage about it.
The car industry seriously needs to think about what it's doing here, and look at not just the security of the electronics it is putting into vehicles, but also how to fix problems with software updates.
Chrysler has pretty much failed with the latter, because the software patch has to be applied manually, via a USB stick as it can't be done remotely.
If this sounds really quite idiotic, you're not alone.
Super geek and internet researcher Geoff Huston at the Asia-Pacific Network Information Centre wrote a great blog post about the "Internet of Stupid Things" which is quite technical, but explains rather well why it's dangerous and irresponsible to network millions of insecure devices.
Car makers could start by reading Huston's blog post, ideally before someone's killed.
Holey Android, this is a bad one.
Speaking of security issues, there's a new, serious vulnerability discovered for Google's Android mobile device operating system.
As is the custom these days, the vulnerability has a catchy name: Stagefright. And, it seems to be really, really bad.
The technical details of Stagefright will be presented at the Black Hat security conference next month, but the researcher who found the hole in Android says all it takes is an MMS SMS message, with a malicious file and boom, your device could be hacked.
Lots of Android devices are affected by the flaw - almost a billion, estimates say.
What's worse is that many will never be patched against the bug.
Is your Android phone about a year and half old? If so, it'll probably be unsupported by the manufacturer, and remain vulnerable to Stagefright (and other vulnerabilities).
This is of course completely unacceptable, and I second security researcher Adam Boileau's advice which is to follow the Consumer Guarantees Act and take the device back to the point of sale because it's not secure and therefore not fit for its purpose.
If that's what it takes to make vendors pay attention and fix flaws, do it.
Businesses are unfortunately left in the lurch on this one.