Bring together a group of hackers to find and exploit vulnerabilities before the bad guys can, and reward the best ones with cash or prizes: that’s the idea behind Pwn2Own. The competition is now in its 17th year and has recently expanded its cyber security focus from consumer products like laptops and mobile phones to include connected vehicles. Since 2019, Tesla has been offering its models as a target for cyber security exploits.
“Before the competition we worked with Tesla to figure out how best to address car security from a Pwn2Own perspective,” says Dustin Childs, Head of Threat Awareness, Zero Day Initiative at cyber security company Trend Micro, the host of Pwn2Own. “How do we write the rules to make it fair and safe? How do we make it relevant? We don’t want to do stunt hacking, something that just looks cool but doesn’t have any practical purpose. It took quite a while to get everything straightened out.”
It’s time to log in (or subscribe).
Not a member? Subscribe now and let us help you understand the future of mobility.
Scroll
News
Magazine
Articles
Special Reports
Research
OEM Tracker
OEM Model Plans
OEM Production Data
OEM Sales Data
1 user
- News
- yes
- Magazine
- yes
- Articles
- yes
- Special Reports
- yes
- Research
- no
- OEM Tracker
- no
- OEM Model Plans
- no
- OEM Production Data
- no
- OEM Sales Data
- no
1 user
- News
- yes
- Magazine
- yes
- Articles
- yes
- Special Reports
- yes
- Research
- yes
- OEM Tracker
- yes
- OEM Model Plans
- yes
- OEM Production Data
- yes
- OEM Sales Data
- yes
Up to 5 users
- News
- yes
- Magazine
- yes
- Articles
- yes
- Special Reports
- yes
- Research
- yes
- OEM Tracker
- yes
- OEM Model Plans
- yes
- OEM Production Data
- yes
- OEM Sales Data
- yes
- News
- yes
- Magazine
- yes
- Articles
- yes
- Special Reports
- yes
- Research
- yes
- OEM Tracker
- yes
- OEM Model Plans
- yes
- OEM Production Data
- yes
- OEM Sales Data
- yes