Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Tesla's Model 2 will be prime target at upcoming hacker contest
This topic contains 1 reply, has 1 voice, and was last updated by Chewy315 1 week, 6 days ago.
-
Topic
-
https://www.theverge.com/2019/1/14/18182539/teslas-model-3-pwn2own-cansec-west-bug-bounty-hacked
Tesla is joining the Pwn2Own contest to allow contests to attempt to hack the car’s security. The car will also be the prize for the winner in the automotive category. Its the first time a car will be put to the hacker test at this contest. Tesla is a popular target for hackers and has offered a paid bug bounty program since 2014.
You must be logged in to reply to this topic.