A robust approach to cyber security is essential for protecting businesses from malicious actors. Bug bounty programmes, an incentive system wherein security researchers receive financial rewards and recognition for reporting new exploits, is one method for identifying potential threats. Tesla is one of the more prominent supporters: in 2019, it awarded two freelance hackers US$375,000 and a Model 3 for demonstrating a just-in-time bug in the vehicle’s web browser that enabled access to the infotainment system. Exploiting this vulnerability allowed them to write a message on the dashboard display.
It’s time to log in (or subscribe).
Not a member? Subscribe now and let us help you understand the future of mobility.
Scroll
News
Magazine
Articles
Special Reports
Research
OEM Tracker
OEM Model Plans
OEM Production Data
OEM Sales Data
Pro
£495/year
or £49.50/month
1 user
1 user
- News
- yes
- Magazine
- yes
- Articles
- yes
- Special Reports
- yes
- Research
- no
- OEM Tracker
- no
- OEM Model Plans
- no
- OEM Production Data
- no
- OEM Sales Data
- no
Pro+
£1,950/year
or £195/month
1 user
1 user
- News
- yes
- Magazine
- yes
- Articles
- yes
- Special Reports
- yes
- Research
- yes
- OEM Tracker
- yes
- OEM Model Plans
- yes
- OEM Production Data
- yes
- OEM Sales Data
- yes
Pro+ Team
£3,950/year
or £395/month
Up to 5 users
Up to 5 users
- News
- yes
- Magazine
- yes
- Articles
- yes
- Special Reports
- yes
- Research
- yes
- OEM Tracker
- yes
- OEM Model Plans
- yes
- OEM Production Data
- yes
- OEM Sales Data
- yes
Pro+ Enterprise
Unlimited
- News
- yes
- Magazine
- yes
- Articles
- yes
- Special Reports
- yes
- Research
- yes
- OEM Tracker
- yes
- OEM Model Plans
- yes
- OEM Production Data
- yes
- OEM Sales Data
- yes