The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
You are here: Home / Viruses & Malware / Contest To Debug the Internet
DDoS Protection Powered By Verisign
HackerOne Contest To Debug the Internet
HackerOne Contest To Debug the Internet
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
NOVEMBER
07
2013


Microsoft and Facebook are serious about exterminating bugs. So serious, in fact, that they are sponsoring a bug bounty campaign that aims to find vulnerabilities in some critical software supporting the Internet stack.

HackerOne is putting on the bug hunting contest and will serve up rewards that range from $300 to $5,000 or more, depending on how widespread the vulnerability is and its severity.

“We've selected some of the most important software that supports the Internet stack, and we want you to hack it,” HackerOne’s Internet Bug Bounty Web site reads. “If the public is demonstrably safer as a result of your contribution to Internet security, we'd like to be the first to recognize your work and say ‘thanks’ by sending some cash to you or your favorite non-profit.”

Scouring the Internet

So what software is in the program? Here’s the list: Sandbox Escapes; Open SSL; Python; Ruby; PHP; Django; Rails; Perl; Phabricator; Nginx; Apache httpd; and the Internet at large.

“The Internet Bug Bounty is managed by a panel of volunteers selected from the security community,” HackerOne said. “These security experts are responsible for defining the rules of the program, allocating bounties to where additional security research is needed most, and mediating any disagreements that might arise.”

Facebook, Microsoft, iSEC Partners, Etsy and Chrome are on the panel. Along with HackerOne, these groups are working to foster a community of hackers who are incentivized to improve the state of Internet security for the world. Part of the program’s goal is also to remove the negative stigma from the “hacker” label.

A Welcome Addition

We turned to Chester Wisniewski, a senior security Advisor at Sophos, for his take on the HackerOne contest. He told us he thinks it is a welcome addition to existing bug bounty programs, particularly considering that it covers many open source projects that might normally not have the funding or staff to run a program themselves.

“Projects like Ruby on Rail and OpenSSL are critical components of our computing infrastructure, but like much of the Internet are showing their age,” he said. “If exploitable, these components pose a risk to all Internet surfers and it is good that more time and attention might be put toward finding their flaws because of a cash incentive.”

Hacking Contests Risings

Hackathons are gaining momentum this fall. Salesforce.com is turning heads with a $1 million #salesforcehack during its Dreamforce event that begins on November 18. Here’s the deal: Developers will create the next killer mobile app on the Salesforce Platform for a chance to win a cool $1 million.

Salesforce has noticed a trend: with social networks rising -- and with the simultaneous proliferation of mobile devices -- developers are looking to capitalize on the potentially lucrative technology shift to create a new class of enterprise apps.

“We’re in the midst of a mobile app renaissance,” said Adam Seligman, vice president of Salesforce Platform developer and partner marketing. “Developers are reinventing how business works, and how companies connect with their customers. With the Salesforce Platform, they have the proven mobile, social and cloud services to create exponentially more productive apps for the enterprise.”

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical things you need to know by accessing the white paper, "5 Things You Didn't Know About Cloud Backup". Access the White Paper now.
MORE IN VIRUSES & MALWARE
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Russian Gang with Stolen IDs Hacks Hosting Company
In August, a Russian cyber gang obtained what researchers called “the largest cache of stolen data." Now, those hackers may be putting their ill-gotten gains to criminal use.
 
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 

Enterprise Hardware Spotlight
AMD's New FX Series CPU Breaks Processing Speed Record
The new FX-8370 processor from Advanced Micro Devices has set a record for silicon processor speed, the company announced. Overclocked, the eight-core chip was measured at 8722.78 MHz.
 
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 

Mobile Technology Spotlight
Rumor Mill Puts Mobile Wallet in iPhone 6
Apple is moving toward the mobile wallet world with its next iPhone. The tech giant has partnered with retailers, banks and major payment networks to make it happen, according to Bloomberg.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.