Tesla Model 3 Will Be The Main Object In The Upcoming Hacker Competition
Indira Datta
In the Pwn2Own competition this year, the Tesla Model 3 will become the first and only participant in the automotive category.
- Hackers Compromised Camera Systems In Tesla Factories
- Tesla Reportedly Makes More Profit This Year From Bitcoin Than Car Sales In 2020
- 135,000 Tesla Cars Recalled Because Of Faulty Flash Memory
The Tesla Model 3 will become one of the targets for hackers to search for vulnerabilities in the upcoming Pwn2Own competition. This is a global competition, for those who research about network security. Hackers will compete and make money by using their talents to discover new vulnerabilities in today's widely used programs.
The organizer of the competition has teamed up with Tesla to make the Model 3 one of the most challenging targets for hackers this year. Plus, the winner of the automotive category will be rewarded with a Tesla Model 3.
The winner will also be rewarded with a Tesla Model 3
This year is the first year a car is literally included in the Pwn2Own competition. This is also an opportunity to see Tesla's determination in digital security. Tesla's software director, David Lau, said the partnership between the car manufacturing company and the network security research community is an invaluable event for the company. He said he was looking forward to the search and discovery from the Pwn2Own competition so that the company could learn from them and improve the quality of its product.
Tesla is the first cars to become an object to attack in the competition
Tesla had a bonus program for those who discover their product security flaws since 2014. Other famous car makers such as Fiat Chrysler and General Motors have also implemented similar programs. In 2015, Tesla was a popular objective of hackers to attack. At that time, researchers could infiltrate the Model S's information display and instrument cluster, but that did not affect the functioning of the car.
The Pwn2Own contest often focuses on software, and recently they have put up an impressive series of browser hacks. Four years ago, one of the researchers who participated in the competition brought home $225,000 for the discovery of three vulnerabilities in the world's most famous browsers including Safari, Chrome and Internet Explorer.