Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference.[1] First held in April 2007 in Vancouver,[2] the contest is now held twice a year,[3] most recently in March 2024.[4] Contestants are challenged to exploit widely used software[5] and mobile devices with previously unknown vulnerabilities.[6] Winners of the contest receive the device that they exploited and a cash prize.[7] The Pwn2Own contest serves to demonstrate the vulnerability of devices and software in widespread use while also providing a checkpoint on the progress made in security since the previous year.
^Ruiu, Dragos (March 20, 2007). "PWN to OWN (was Re: How Apple orchestrated web attack on researchers)". Archived from the original on May 27, 2012. Retrieved April 1, 2012.
^Cite error: The named reference phonecall was invoked but never defined (see the help page).
^Goodin, Dan (January 14, 2019), Pwn2Own contest will pay $900,000 for hacks that exploit this Tesla, Ars Technica, retrieved August 16, 2019
^Dustin Childs (19 March 2024). "PWN2OWN VANCOUVER 2024 - THE FULL SCHEDULE". zerodayinitiative.com.
^Cite error: The named reference firstpwn2own was invoked but never defined (see the help page).
^Cite error: The named reference 2009announce-zdi was invoked but never defined (see the help page).
^Cite error: The named reference CitationB was invoked but never defined (see the help page).
Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. First held in April 2007 in Vancouver, the contest is now held...
security weaknesses in their products; being the first female participant in Pwn2Own, the world's premiere professional hacking competition with significant...
vulnerabilities in Chrome were exploited in the three years of Pwn2Own from 2009 to 2011. At Pwn2Own 2012, Chrome was defeated by a French team who used zero...
2011, 2012, 2013 and 2014 Vupen won first prize in the hacking contest Pwn2Own, most notably in 2012 by exploiting a bug in Google Chrome. Their decision...
Archived from the original on March 26, 2010. Retrieved March 27, 2010. "Pwn2Own 2010: interview with Charlie Miller". March 1, 2010. Archived from the...
contest aimed at computer security experts called "Pwnium". Similar to the Pwn2Own contest, they invited hackers from around the world to find exploits in...
browsers on the device. In November 2019, a security research team in the Pwn2Own hacking contest hacked into an Amazon Echo Show 5. They did so by hacking...
Add-ons. Mozilla Foundation. Archived from the original on 15 April 2013. "Pwn2Own 2010: interview with Charlie Miller". 1 March 2010. Archived from the original...
Notes". Archived from the original on 2023-04-11. Retrieved 2023-04-11. Pwn2Own day 2: iPhone, BlackBerry beaten; Chrome, Firefox no-shows Archived 2012-05-02...
Pointer Vulnerability (Sebastian Apelt, CVE-2014-1767); the winner of Pwn2Own 2014. Most Innovative Research: RSA Key Extraction via Low-Bandwidth Acoustic...
training. CanSecWest, in Vancouver is held at the end of March and hosts the Pwn2Own hacking contest. CSS - International Conference on Cryptography and Security...
disclosed vulnerabilities found in Adobe software." ZDI also adjudicates the Pwn2Own hacking competition which occurs three times a year, where teams of hackers...
software. On 19 September 2012, security researchers demonstrated during Pwn2Own, a computer hacking contest held in Amsterdam, Netherlands, that the S III...
December 8, 2020 81 The Vendor 1:17:59 December 22, 2020 82 Master of Pwn Pwn2Own 1:05:09 January 5, 2021 83 NSA Cryptologists 1:22:56 January 19, 2021 84...
Cyber threat hunting List of cyber warfare forces Project Zero (Google) Pwn2Own Deception technology Active Defense Cyber-security regulation Cyber security...