Hacking competition dedicated to the automotive industry

Hacking competition dedicated to the automotive industry

Share post

The Zero Day Initiative (ZDI) expands Pwn2Own competition as threats to connected cars continue to grow. Trend Micro runs the hacking competition, which specifically targets the automotive industry and hacking teams to promote security research.

Trend Micro, one of the world's leading providers of cybersecurity solutions, is expanding its Zero Day Initiative (ZDI) Pwn2Own hacking competition with another event. Under the name "Pwn2Own Automotive", there will be an independent competition for the first time at the Automotive World Tokyo in January 2024 on the cyber security of networked vehicles. The aim is to make the connected car ecosystem, which is increasingly becoming the target of cyber attacks, more secure.

The Pwn2Own competition has existed for 17 years. Security researchers from around the world come together for the hacking events to uncover vulnerabilities in commonly used devices and applications - before they fall victim to cybercriminals.

Pwn2Own Automotive pursues three goals

  • Promoting safety research in the automotive sector by supporting scientists, including financially, in the study of different products and platforms.
  • Complete attack surface screening by prioritizing critical technologies as the subject of research.
  • Incentives for the discovery of sophisticated and complex threats by offering higher rewards for multi-system attacks.

Vehicle systems have played an increasingly important role in the Pwn2Own hacking competition in recent years, notably with Tesla's regular participation since 2019. Back then, a team of security researchers won the overall Master of Pwn award after successfully testing a Tesla model 3 had hacked.

In 2019 a Tesla was hacked

Last year, participants were able to demonstrate how to exploit two other zero-day vulnerabilities in the vehicle's infotainment system. Tesla will also be a sponsor of Pwn2023Own Vancouver in 2 and will again provide a Model 3 as a prize for successful participants.

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more