Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

White Hat Hacker Gains Access to Tesla’s Servers and Its Entire Fleet

White Hat Hacker Gains Access to Tesla’s Servers and Its Entire Fleet

Sometimes a story seems too unreal to be true but when it comes to hacks, nothing is impossible. Apparently, a whitehat hacker successfully managed to access Tesla’s internal servers and the firm’s entire fleet.

The hack happened back in 2017 and was done by Jason Hughes known in the Tesla community under his WK057 alias. Being a good guy, Hughes reported the vulnerabilities that allowed him to perform the hack to Tesla and they were surely patched up but the incident does bring attention to the dangers of autonomous vehicles.

At the time of the incident, Hughes was playing around with Tesla vehicles by building off-grid energy storage systems and electric conversion kits. He had even turned his skills into a fruitful business where he sold parts from salvaged Teslas.

Also Read: 10 Tips For Drafting Key Terms In A Service Agreement

While doing all that, he discovered a series of vulnerabilities in Tesla’s fleet management systems. He immediately alerted Tesla’s head of software security.

The executive asked him to prove the hack by activating the Summon feature on a car in California. This was a piece of cake for Hughes who did so quite easily. He also shared a vulnerability report online. Grateful for pointing out this flaw, Tesla paid Hughes a whopping $50,000. Quite a story eh?

White Hat Hacker Gains Access to Tesla's Servers and Its Entire Fleet
Source: Bugcrowd

Electrek also reported that Tesla CEO Elon Musk referred to the hack at an event back in 2017, pointing out how disastrous such an event would be. 

“In principle, if someone was able to say hack all the autonomous Teslas, they could say — I mean just as a prank — they could say ‘send them all to Rhode Island’ — across the United States… and that would be the end of Tesla and there would be a lot of angry people in Rhode Island,” he said.

Also Read: Deemed Consent PDPA: How Do Businesses Comply?



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us