Security News

Researchers can earn up to $300,000 and a car if they manage to hack a Tesla Model 3 at this year’s Pwn2Own competition, Trend Micro’s Zero Day Initiative (ZDI) announced on Monday. read more

It's like a turducken of screw-ups Roundup As America prepares for Thursday's Thanksgiving rituals of turkey, football, and awkward conversations with extended family, three organisations are...

A powerful, easy-to-use password stealing program known as Agent Tesla has been infecting computers since 2014, but recently this malware strain has seen a surge in popularity -- attracting more...

Despite having proper security measures in place to protect the driving systems of its cars against cyber attacks, a team of security researchers discovered a way to remotely hack a Tesla Model S...

Researchers able to clone fob and nick motor in seconds Boffins have sprung the bonnet on the weak crypto behind the keyless entry system in Tesla's Model S car.…

Raspberry Pi's processing power versus Tesla's Model X cryptography - victory for the little guy!

Researchers claim to have discovered a new attack method that can be used to quickly clone the wireless key fob of Tesla Model S and possibly other vehicles. read more

Carmaker won't void warranties, fling sueballs at pros seeking security vulnerability rewards Tesla will allow vetted security researchers to hunt for vulnerabilities in its vehicle firmware risk...

Carmaker won't void warranties for those seeking security vulnerability rewards Tesla says it will allow security researchers to hunt for vulnerabilities in its cars' firmware – as long as it is...

Tesla has been accused of pursuing self-interest in open sourcing its security code. That's true, but not the whole story.