FCA is willing to pay you to hack its cars, as long as you tell the company how you did it. In an effort to enhance cybersecurity and prevent future incidents like the Jeep Cherokee hack last year, FCA announced it's working with Bugcrowd to find vulnerabilities in its vehicle software.

Bugcrowd labels itself as a crowdsourced application security testing company. Users, or independent security researchers as Bugcrowd calls them, can find exploits or vulnerabilities in FCA systems. They then submit the information to Bugcrowd, who in turn supplies the info to FCA. The goal is to update systems and close any possible security breaches.

FCA is offering bounties from $150 to $1,500 to any Mr. Robot types, with payment based on the size and severity of the flaw. FCA wants hackers to focus specifically on the UConnect website and the company's iOS and Android apps. No bounties will be given for anything outside the scope of those three things. Bugcrowd says it will not take any legal action against anyone who submits an exploit.

While we think it's good that the company is taking steps to address these problems, it's not a groundbreaking maneuver. Other companies employ similar systems. Earlier this year, both Tesla and Uber announced that they're willing to offer up to $10,000 to hackers who find vulnerabilities in their system. For years, Microsoft has been paying hackers to find exploits. It also seems that FCA took its time to announce this plan, considering the Jeep hack happened nearly a year ago.

If the partnership works, we can expect other automakers to make similar deals.

Related Video:

FCA Uconnect Hack Fix

Help us improve our comments.
Share This Photo X