

On the first day of the conference in Vancouver, British Columbia, Ruiu asked Terri Forslof of the Zero Day Initiative (ZDI) to participate in the contest. The name "Pwn2Own" was derived from the fact that contestants must " pwn" or hack the device in order to "own" or win it.


Any conference attendee that could connect to this wireless access point and exploit one of the devices would be able to leave the conference with that laptop. The contest was to include two MacBook Pros that he would leave on the conference floor hooked up to their own wireless access point. On March 20, roughly three weeks before CanSecWest that year, Ruiu announced the Pwn2Own contest to security researchers on the DailyDave mailing list. At the time, there was a widespread belief that, despite these public displays of vulnerabilities in Apple products, OS X was significantly more secure than any other competitors. The first contest in 2007 was conceived and developed by Dragos Ruiu in response to his frustration with Apple Inc.'s lack of response to the Month of Apple Bugs and the Month of Kernel Bugs, as well as Apple's television commercials that trivialized the security built into the competing Windows operating system.

The Pwn2Own contest serves to demonstrate the vulnerability of devices and software in widespread use while also providing a checkpoint on the progress made in security since the previous year. Winners of the contest receive the device that they exploited and a cash prize. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. First held in April 2007 in Vancouver, the contest is now held twice a year, most recently in April 2021. Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. Please help update this article to reflect recent events or newly available information.
