Tesla Model 3 Submitted for Pwn2Own hacking contest

Published by

teaser

Yeah, it's multiple computer systems on wheels eh? So how safe is the all computer-based Tesla Model 3? Well, Tesla would like to find out as participants of the Pwn2Own hacking contest will have the chance to win a Tesla Model 3.



Tesla will be submitting the card for the annual event (Trend Micro’s Zero Day Initiative (ZDI)) and will give away a Model 3 to the security researchers that will crack the vehicle. So the Model 3 will be the target for hackers at the event along with several other products like Oracle VirtualBox, Microsoft Office 365, Google Chrome and more.

“Our work with the security research community is invaluable to us,” said Tesla’s vehicle software chief David Lau. “We look forward to learning about and rewarding great work in Pwn2Own so that we can continue to improve our products and our approach.”

It is a good bounty hunt as the winners will share over $1 million in cash and prizes in this year's contest.  Tesla has also been running its own bug bounty program since 2014. In 2018, it increased the bounty from $10,000 to $15,000 and announced that as long as research is done in good faith with its bug bounty program, it would not void the warranty of vehicles used for research.

Tesla Model 3 Submitted for Pwn2Own hacking contest


Share this content
Twitter Facebook Reddit WhatsApp Email Print