Tesla Model 3 Will Be The Main Object In The Upcoming Hacker Competition
Indira Datta
In the Pwn2Own competition this year, the Tesla Model 3 will become the first and only participant in the automotive category.
- Tesla Robotaxi Finally Hits the Streets: $4.20 Rides That'll Make You Hold Your Breath
- Tesla vs Zoox vs Waymo: Who would win?
- Elon Musk Eyes Indian Market: Tesla’s Next Big Move?
The Tesla Model 3 will become one of the targets for hackers to search for vulnerabilities in the upcoming Pwn2Own competition. This is a global competition, for those who research about network security. Hackers will compete and make money by using their talents to discover new vulnerabilities in today's widely used programs.
The organizer of the competition has teamed up with Tesla to make the Model 3 one of the most challenging targets for hackers this year. Plus, the winner of the automotive category will be rewarded with a Tesla Model 3.
The winner will also be rewarded with a Tesla Model 3
This year is the first year a car is literally included in the Pwn2Own competition. This is also an opportunity to see Tesla's determination in digital security. Tesla's software director, David Lau, said the partnership between the car manufacturing company and the network security research community is an invaluable event for the company. He said he was looking forward to the search and discovery from the Pwn2Own competition so that the company could learn from them and improve the quality of its product.
Tesla is the first cars to become an object to attack in the competition
Tesla had a bonus program for those who discover their product security flaws since 2014. Other famous car makers such as Fiat Chrysler and General Motors have also implemented similar programs. In 2015, Tesla was a popular objective of hackers to attack. At that time, researchers could infiltrate the Model S's information display and instrument cluster, but that did not affect the functioning of the car.
The Pwn2Own contest often focuses on software, and recently they have put up an impressive series of browser hacks. Four years ago, one of the researchers who participated in the competition brought home $225,000 for the discovery of three vulnerabilities in the world's most famous browsers including Safari, Chrome and Internet Explorer.
Featured Stories
ICT News - Mar 05, 2026
X Platform Implements Strict Measures Against Fake AI-Generated Videos Amid Iran...
How To - Mar 04, 2026
Getting Started with AI: A Newbie's Simple Guide
ICT News - Mar 03, 2026
Budget Entry-Level PCs Under $500 to Vanish by 2028 Due to Memory Price Surge
ICT News - Mar 02, 2026
IDC Report Predicts Surging Smartphone Prices Due to Global RAM Shortage
ICT News - Mar 01, 2026
Samsung Links Galaxy S26 Price Hikes to AI Memory Supply Issues
ICT News - Feb 28, 2026
Anthropic Blacklisted by US Department of War: Trump Orders Federal Ban Over AI...
ICT News - Feb 26, 2026
AI Models Frequently Resort to Nuclear Escalation in Simulated Crises, Study...
ICT News - Feb 23, 2026
It's Over for Xbox: Asha Sharma Takes Over to Ruin Microsoft Gaming with AI
ICT News - Feb 22, 2026
Which AI Model Excels at Which Task in 2026: A Comprehensive Guide
ICT News - Feb 21, 2026
AI Coding Agent Causes Major AWS Outage at Amazon
Read More
Gadgets- Mar 08, 2026
Best Budget Keyboards of 2026
These budget keyboards prove that you don't need to spend hundreds for a quality typing experience in 2026.
Mobile- Mar 08, 2026
Transforming Android: New Desktop Mode Makes Phones PC-Capable
This update marks an exciting era for Android, empowering users to do more with their everyday devices.