Tesla wants hackers to try and hack their electric vehicles

Tesla teases hackers, with plans to open one of their electric vehicles to hackers at Defcon in Las Vegas later this year.

Published
Updated
1 minute & 25 seconds read time

Just a week after Tesla Motors' Twitter page was hacked, the electric vehicle maker wants to have hackers attempt to hack their cars, something the company will be asking hackers to do at the Defcon convention later this year in Las Vegas, according to anonymous sources of Forbes.

Tesla wants hackers to try and hack their electric vehicles | TweakTown.com

Having hackers try to break into a Tesla vehicle has benefits for the company, as it will make Tesla aware of any security holes in their vehicles and software, and they'll have their picking of hiring anyone who is capable of hacking into their vehicles, and having them instead plug the security holes they discovered.

With a concentrated effort on making vehicles and the world around them smarter and smarter, electric and autonomous vehicle makers are going to need increasingly stronger and near invincible security on their cars. This means we're going to see a huge focus on digital security on cars at both Defcon and BlackHat 2015, both taking place in Vegas later this year.

Online blog Lifars reports that "Notable hackers Chris Valasek and Charlie Miller, popular for their prowess in hacking into automobiles in the past have promised to exhibit a car hack which they claim - will wirelessly hack a car for remote control". Lifars reported that an excerpt from their talk says: "Although the hacking of automobiles is a topic often discussed, details regarding successful attacks, if ever made public, are non-comprehensive at best".

It continued: "The ambiguous nature of automotive security leads to narratives that are polar opposites: either we're all going to die or our cars are perfectly safe. In this talk, we will show the reality of car hacking by demonstrating exactly how a remote attack works against an unaltered, factory vehicle.

Starting with remote exploitation, we will show how to pivot through different pieces of the vehicle's hardware in order to be able to send messages on the CAN(Control Area Network) bus to critical electronic control units. We will conclude by showing several CAN messages that affect physical systems of the vehicle. By chaining these elements together, we will demonstrate the reality and limitations of remote car attacks".

NEWS SOURCE:blog.lifars.com

Anthony joined the TweakTown team in 2010 and has since reviewed 100s of graphics cards. Anthony is a long time PC enthusiast with a passion of hate for games built around consoles. FPS gaming since the pre-Quake days, where you were insulted if you used a mouse to aim, he has been addicted to gaming and hardware ever since. Working in IT retail for 10 years gave him great experience with custom-built PCs. His addiction to GPU tech is unwavering and has recently taken a keen interest in artificial intelligence (AI) hardware.

Newsletter Subscription

Related Tags