Skip to content

Is this the cutting edge of cyber exploits?

Events like Pwn2Own seek to raise the bar on connected car security. By Megan Lampinen

Bring together a group of hackers to find and exploit vulnerabilities before the bad guys can, and reward the best ones with cash or prizes: that’s the idea behind Pwn2Own. The competition is now in its 17th year and has recently expanded its cyber security focus from consumer products like laptops and mobile phones to include connected vehicles. Since 2019, Tesla has been offering its models as a target for cyber security exploits.

“Before the competition we worked with Tesla to figure out how best to address car security from a Pwn2Own perspective,” says Dustin Childs, Head of Threat Awareness, Zero Day Initiative at cyber security company Trend Micro, the host of Pwn2Own. “How do we write the rules to make it fair and safe? How do we make it relevant? We don’t want to do stunt hacking, something that just looks cool but doesn’t have any practical purpose. It took quite a while to get everything straightened out.”

It’s time to log in (or subscribe).

Not a member? Subscribe now and let us help you understand the future of mobility.

Pro
£495/year
or £49.50/month
1 user
News
yes
Magazine
yes
Articles
yes
Special Reports
yes
Research
no
OEM Tracker
no
OEM Model Plans
no
OEM Production Data
no
OEM Sales Data
no
Pro+
£1,950/year
or £195/month
1 user
News
yes
Magazine
yes
Articles
yes
Special Reports
yes
Research
yes
OEM Tracker
yes
OEM Model Plans
yes
OEM Production Data
yes
OEM Sales Data
yes
Pro+ Team
£3,950/year
or £395/month
Up to 5 users
News
yes
Magazine
yes
Articles
yes
Special Reports
yes
Research
yes
OEM Tracker
yes
OEM Model Plans
yes
OEM Production Data
yes
OEM Sales Data
yes
Pro+ Enterprise
Unlimited
News
yes
Magazine
yes
Articles
yes
Special Reports
yes
Research
yes
OEM Tracker
yes
OEM Model Plans
yes
OEM Production Data
yes
OEM Sales Data
yes

Welcome back , to continue browsing the site, please click here