Win a free new car – just show Intel how you'd hack your existing one

Chipzilla invites security bods onto its car safety board


Intel is getting serious – dead serious, apparently – about car hacking. And nothing says serious like a prize giveaway. If you join Chipzilla's new Automotive Security Review Board and make all the right noises, you can win a free new ride.

The chip-baking giant revealed the review board on Monday, and is inviting seasoned information security from around the world to join the panel. Their job? To shore up the defenses of tomorrow's web-connected motors to stop miscreants from hijacking people's vehicles. Essentially, bringing the soaraway success of PC security to the dashboard and gas pedal.

"The Automotive Security Review Board will bring together top security industry talent from around the world who have expertise in particular areas of cyber-physical systems," Intel insisted.

"ASRB researchers will perform ongoing security tests and audits intended to codify best practices and design recommendations for advanced cyber-security solutions and products to benefit the automobile industry and drivers."

The researchers' findings will be published for everyone to check out. Crucially, we're told:

To motivate the ASRB researchers, Intel will award a new car (or cash equivalent) to the member who provides the most significant and impactful cybersecurity contribution that can be implemented on Intel's automotive platform.

Now that's pwn2own.

"We can, and must, raise the bar against cyberattacks in automobiles," said Chris Young, general manager of Intel Security.

All this comes after infosec bods were able to wirelessly infiltrate Fiat Chrysler autos via the internet, and mess around with the internal systems, and another guy was able to unlock cars made by General Motors using a $100 box of tricks.

Gartner reckons there will be 150 to 250 million vehicles that are hooked up to the internet on the road in 2020 – so get ready for regular overnight patching of your car's firmware for vulnerabilities. How did we get to this point? Isn't thumbing through tweets or YouTube on a 4G smartphone in the passenger seat enough? ®

Similar topics


Other stories you might like

Biting the hand that feeds IT © 1998–2021