Tesla Model 3 Will Be The Main Object In The Upcoming Hacker Competition
Indira Datta
In the Pwn2Own competition this year, the Tesla Model 3 will become the first and only participant in the automotive category.
- Tesla Robotaxi Finally Hits the Streets: $4.20 Rides That'll Make You Hold Your Breath
- Tesla vs Zoox vs Waymo: Who would win?
- Elon Musk Eyes Indian Market: Tesla’s Next Big Move?
The Tesla Model 3 will become one of the targets for hackers to search for vulnerabilities in the upcoming Pwn2Own competition. This is a global competition, for those who research about network security. Hackers will compete and make money by using their talents to discover new vulnerabilities in today's widely used programs.
The organizer of the competition has teamed up with Tesla to make the Model 3 one of the most challenging targets for hackers this year. Plus, the winner of the automotive category will be rewarded with a Tesla Model 3.
The winner will also be rewarded with a Tesla Model 3
This year is the first year a car is literally included in the Pwn2Own competition. This is also an opportunity to see Tesla's determination in digital security. Tesla's software director, David Lau, said the partnership between the car manufacturing company and the network security research community is an invaluable event for the company. He said he was looking forward to the search and discovery from the Pwn2Own competition so that the company could learn from them and improve the quality of its product.
Tesla is the first cars to become an object to attack in the competition
Tesla had a bonus program for those who discover their product security flaws since 2014. Other famous car makers such as Fiat Chrysler and General Motors have also implemented similar programs. In 2015, Tesla was a popular objective of hackers to attack. At that time, researchers could infiltrate the Model S's information display and instrument cluster, but that did not affect the functioning of the car.
The Pwn2Own contest often focuses on software, and recently they have put up an impressive series of browser hacks. Four years ago, one of the researchers who participated in the competition brought home $225,000 for the discovery of three vulnerabilities in the world's most famous browsers including Safari, Chrome and Internet Explorer.
Featured Stories
ICT News - Feb 18, 2026
Google's Project Toscana: Elevating Pixel Face Unlock to Rival Apple's Face ID
Mobile - Feb 16, 2026
Xiaomi Launches Affordable Tracker to Compete with Apple's AirTag
ICT News - Feb 15, 2026
X Platform Poised to Introduce In-App Crypto and Stock Trading Soon
ICT News - Feb 13, 2026
Elon Musk Pivots: SpaceX Prioritizes Lunar Metropolis Over Martian Colony
ICT News - Feb 10, 2026
Discord's Teen Safety Sham: Why This Data Leak Magnet Isn't Worth Your Trust...
ICT News - Feb 09, 2026
PS6 Rumors: Game-Changing Specs Poised to Transform Console Play
ICT News - Feb 08, 2026
Is Elon Musk on the Path to Becoming the World's First Trillionaire?
ICT News - Feb 07, 2026
NVIDIA's Gaming GPU Drought: No New Releases in 2026 as AI Takes Priority
ICT News - Feb 06, 2026
Elon Musk Clarifies: No Starlink Phone in Development at SpaceX
ICT News - Feb 03, 2026
Elon Musk's SpaceX Acquires xAI in Landmark $1.25 Trillion Merger
Read More
Mobile- Feb 16, 2026
Xiaomi Launches Affordable Tracker to Compete with Apple's AirTag
For users tired of ecosystem lock-in or high prices, the Xiaomi Tag represents a compelling, no-frills option that delivers core functionality at a fraction of the cost.
ICT News- Feb 18, 2026
Google's Project Toscana: Elevating Pixel Face Unlock to Rival Apple's Face ID
As the smartphone landscape evolves, Google's push toward superior face unlock technology underscores its ambition to close the gap with Apple in user security and convenience.
Mobile- Feb 17, 2026
Anticipating the Samsung Galaxy S26 and S26+: Key Rumors and Specs
The Samsung Galaxy S26 series is on the horizon, sparking excitement among tech enthusiasts.