SHARE

Hackers won $ 10,000 last year, as they participated and exploited Tesla car model in a hacking competition. In competition , researchers from Ohio 360 won who are known as Sean and app security app Giants.

Last year Tesla hack was not Tesla approved. In fact this year Tesla is planning for bigger And better as at Defcon convention in Las Vegas, they are planning to provide Elon Musk’s electric car to hackers so that they can play around with connected parts of the car.

According to inside sources  Tesla’s security team is keeping them anonymous and they are receiving double benefit out of this act as they will get to know all bugs that are present inside car network that can make it vulnerable to attacks.

Tesla also looks for people who can join in and work as a part of their security team through such events.

 

 

iphone hack car

 

They will  (at Defcon) organize one car hacking village and model s will be there on display but will not be provided for testing.

At Defcon , a great focus is on digital security in car. Black hat 2015 also focuses on digital network of cars and security. Famous mischief hackers Chris Valasek and Charlie Miller have promised to show their car hack , in which they will remotely access car and will control all their breaks and gears through exploiting CAN :control area network of automobile.

If successful car backs are made available for public then it may lead to safest cars or no cars at all.They will show the entire world , how the different pieces of vehicle’s-hardware travels through CAN network. By connecting all the elements of vehicle , they will be able to show how in reality the cars are attacked remotely and what are limitations.

Though Valasek have not revealed their plans of hacks and other intricacies but they have sent clues via their Twitter account , what vehicle’s will be attacked and how they will show the world about remote attacks on cars.

tesla model hack

NO COMMENTS

LEAVE A REPLY

This site uses Akismet to reduce spam. Learn how your comment data is processed.