Increasingly connected, “new generation” cars are exposed to cyber risks. Like web giants, car manufacturers organize competitions “ whitehat » in order to identify possible vulnerabilities. Tesla took part in one of these competitions in Tokyo.
Tesla submits to Pwn2Own ethical hackers
In 2022, it only took a hacker two minutes to hack a Tesla Model 3. A feature that allowed drivers to quickly start without placing the key on the center console had been the subject of numerous failures. Since then, the brand has changed its strategy. A few days ago, Tesla participated in the hacking competition Pwn2Own in Tokyo. The first event of its kind dedicated to the world of automobiles.
Peugeot e-308 price: it’s confirmed, the compact electric lion is expensive
The principle is simple: groups of ethical hackers compete with the aim of identifying technological vulnerabilities. Proof that the car industry is changing. Elon Musk’s company has long invested in cybersecurity. A strategy that paid off since Tesla managed to correct dozens, even hundreds of vulnerabilities in its systems before they could be exploited.
The brand’s infotainment system was hacked
This is precisely the mission of ethical hackers. As part of the event organized by Pwn2Own, the cybersecurity experts present also tackled electric vehicle charging stations. In Tokyo, hackers identified new vulnerabilities in Tesla’s infotainment system. This is the team Synactive » which was the most efficient.
In total, the hackers won $450,000 for discovering numerous flaws in the American manufacturer’s systems. Some hackers have also managed to take control of charging stations. An interesting initiative to allow companies in the industry to perfect their technologies and a mandatory transition in 2024 given the level of connectivity of automobiles.
The World After Us: Elon Musk misses the message regarding damaged Teslas
It’s also a way to stay one step ahead of malicious hackers. At the same time, Tesla also manages its own bug bounty program with experts in vulnerability detection. On the company’s website, we can read that the brand “ appreciates the work done by security researchers. We are committed to working with this community to verify and respond to reported vulnerabilities ».
rewrite this content and keep HTML tags