Tesla Model 3 Will Be The Main Object In The Upcoming Hacker Competition
Indira Datta
In the Pwn2Own competition this year, the Tesla Model 3 will become the first and only participant in the automotive category.
- Tesla Robotaxi Finally Hits the Streets: $4.20 Rides That'll Make You Hold Your Breath
- Tesla vs Zoox vs Waymo: Who would win?
- Elon Musk Eyes Indian Market: Tesla’s Next Big Move?
The Tesla Model 3 will become one of the targets for hackers to search for vulnerabilities in the upcoming Pwn2Own competition. This is a global competition, for those who research about network security. Hackers will compete and make money by using their talents to discover new vulnerabilities in today's widely used programs.
The organizer of the competition has teamed up with Tesla to make the Model 3 one of the most challenging targets for hackers this year. Plus, the winner of the automotive category will be rewarded with a Tesla Model 3.
The winner will also be rewarded with a Tesla Model 3
This year is the first year a car is literally included in the Pwn2Own competition. This is also an opportunity to see Tesla's determination in digital security. Tesla's software director, David Lau, said the partnership between the car manufacturing company and the network security research community is an invaluable event for the company. He said he was looking forward to the search and discovery from the Pwn2Own competition so that the company could learn from them and improve the quality of its product.
Tesla is the first cars to become an object to attack in the competition
Tesla had a bonus program for those who discover their product security flaws since 2014. Other famous car makers such as Fiat Chrysler and General Motors have also implemented similar programs. In 2015, Tesla was a popular objective of hackers to attack. At that time, researchers could infiltrate the Model S's information display and instrument cluster, but that did not affect the functioning of the car.
The Pwn2Own contest often focuses on software, and recently they have put up an impressive series of browser hacks. Four years ago, one of the researchers who participated in the competition brought home $225,000 for the discovery of three vulnerabilities in the world's most famous browsers including Safari, Chrome and Internet Explorer.
Featured Stories
ICT News - Mar 29, 2026
FTC Takes Action Against Debanking Practices by Major Financial Firms
ICT News - Mar 27, 2026
Palantir CTO Identifies Iran Conflict as First Large-Scale AI-Driven War
ICT News - Mar 24, 2026
OpenAI on the Brink: Major Setbacks Signal the Bursting of the AI Bubble
ICT News - Mar 20, 2026
Top 10 Most Popular Social Media Sites Based on User Count in 2026
ICT News - Mar 19, 2026
Billion Dollar Blunder: Meta Shuts Down Metaverse After Wasting $80,000,000,000.00
ICT News - Mar 18, 2026
X to Introduce Regional Controls for Posts and Replies
ICT News - Mar 17, 2026
Is DLSS 5 Helping Games or Hurting Developers' Creative Style?
ICT News - Mar 16, 2026
AI's Role in Warfare: US Strikes on Iran Unveiled
ICT News - Mar 15, 2026
Elon Musk's Bold Chip Venture: Tesla's Massive Fab Initiative Sparks AI Hardware...
ICT News - Mar 14, 2026
Elon Musk's High-Stakes $109 Billion Lawsuit Against OpenAI and Microsoft
Read More
ICT News- Mar 29, 2026
FTC Takes Action Against Debanking Practices by Major Financial Firms
The Federal Trade Commission has sent warning letters to PayPal, Stripe, Visa, and Mastercard over concerns about debanking lawful businesses and consumers.