Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
UCS Invicta: Integrated Flash
Deploy flash memory technology to
deliver peak workload performance.

Find out more>>
Linux/Open Source
Is your endpoint data protected?
Average Rating:
Rate this article:  
HackerOne Contest To Debug the Internet

HackerOne Contest To Debug the Internet
By Jennifer LeClaire

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

Chrome, Facebook, Microsoft and others are joining HackerOne's Internet Bug Bounty Contest to improve the state of Internet security for the world. Through it's Internet Bug Bounty Contest, HackerOne is offering cash prices to hackers who hunt down bugs in some critical software that supports the Internet stack.
 


Microsoft and Facebook are serious about exterminating bugs. So serious, in fact, that they are sponsoring a bug bounty campaign that aims to find vulnerabilities in some critical software supporting the Internet stack.

HackerOne is putting on the bug hunting contest and will serve up rewards that range from $300 to $5,000 or more, depending on how widespread the vulnerability is and its severity.

“We've selected some of the most important software that supports the Internet stack, and we want you to hack it,” HackerOne’s Internet Bug Bounty Web site reads. “If the public is demonstrably safer as a result of your contribution to Internet security, we'd like to be the first to recognize your work and say ‘thanks’ by sending some cash to you or your favorite non-profit.”

Scouring the Internet

So what software is in the program? Here’s the list: Sandbox Escapes; Open SSL; Python; Ruby; PHP; Django; Rails; Perl; Phabricator; Nginx; Apache httpd; and the Internet at large.

“The Internet Bug Bounty is managed by a panel of volunteers selected from the security community,” HackerOne said. “These security experts are responsible for defining the rules of the program, allocating bounties to where additional security research is needed most, and mediating any disagreements that might arise.”

Facebook, Microsoft, iSEC Partners, Etsy and Chrome are on the panel. Along with HackerOne, these groups are working to foster a community of hackers who are incentivized to improve the state of Internet security for the world. Part of the program’s goal is also to remove the negative stigma from the “hacker” label.

A Welcome Addition

We turned to Chester Wisniewski, a senior security Advisor at Sophos, for his take on the HackerOne contest. He told us he thinks it is a welcome addition to existing bug bounty programs, particularly considering that it covers many open source projects that might normally not have the funding or staff to run a program themselves.

“Projects like Ruby on Rail and OpenSSL are critical components of our computing infrastructure, but like much of the Internet are showing their age,” he said. “If exploitable, these components pose a risk to all Internet surfers and it is good that more time and attention might be put toward finding their flaws because of a cash incentive.”

Hacking Contests Risings

Hackathons are gaining momentum this fall. Salesforce.com is turning heads with a $1 million #salesforcehack during its Dreamforce event that begins on November 18. Here’s the deal: Developers will create the next killer mobile app on the Salesforce Platform for a chance to win a cool $1 million.

Salesforce has noticed a trend: with social networks rising -- and with the simultaneous proliferation of mobile devices -- developers are looking to capitalize on the potentially lucrative technology shift to create a new class of enterprise apps.

“We’re in the midst of a mobile app renaissance,” said Adam Seligman, vice president of Salesforce Platform developer and partner marketing. “Developers are reinventing how business works, and how companies connect with their customers. With the Salesforce Platform, they have the proven mobile, social and cloud services to create exponentially more productive apps for the enterprise.”
 

Tell Us What You Think
Comment:

Name:



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 Linux/Open Source
1.   CenturyLink Aids Docker Management
2.   Oracle Releases a Slew of Upgrades
3.   Samsung Postpones Tizen Phone
4.   HP Drops $50M on Hortonworks
5.   Teradata Bets Big on 2 Big Data Buys


advertisement
CenturyLink Aids Docker Management
Open-source Panamax for developers.
Average Rating:
Oracle Releases a Slew of Upgrades
Database 12c, Linux 7, Data Cloud.
Average Rating:
Samsung Postpones Tizen Phone
No developer interest in platform.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Chinese Hackers Nab Info on Millions of U.S. Patients
A group of Chinese hackers has stolen the personal information, including names and Social Security numbers, of about 4.5 million patients at hospitals operated by Community Health Systems.
 

Enterprise Hardware Spotlight
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 
Compression, Deduplication Come to Violin Concerto 2200
Violin Memory has announced that data deduplication and compression capabilities are now available on its Concerto 2200 solution. Typically, users will experience deduplication rates between 6:1 and 10:1.
 

Mobile Technology Spotlight
Apple Stock Soars Ahead of iPhone 6 Launch
The imminent release of the iPhone 6 -- and maybe even an iWatch -- has sent Apple's stock soaring to new heights. Considering what else the firm could have up its sleeve -- the stratosphere may be the limit.
 
HTC Debuts Windows Phone Version of One M8 Smartphone
HTC is bringing the Windows Phone mobile OS to its flagship One M8 device -- the first time any mainstream flagship smartphone has been offered with a choice of operating systems.
 
Verizon Earns Top Rating in Mobile Network Comparison
A new report says Verizon Wireless was the top-performing U.S. cellphone service provider in the first half of 2014, on a nationwide and state-by-state basis, as well as in metro areas.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.