Archive for the ‘bug bounty’ Category
A security researcher has discovered a critical vulnerability in Facebook that could allow attackers to delete any video of the social networking site shared by anyone on their wall.
The flaw has been discovered by security researcher Dan Melamed in June 2016, allowing him not only to remotely delete any video on Facebook shared by anyone without having any permission or authentication but
Posted in bug bounty, delete Facebook video, Facebook hack, Facebook hacking tool, facebook vulnerability, How to Hack Facebook, Vulnerability | Comments (0)
Bug bounty program focuses on hardware exploits
Posted in 3DS, bug bounty, Nintendo, Security threats, Vulnerability | Comments (0)
The government announced its second bug bounty program called Hack the Army, which will concentrate on finding bugs in recruiting websites and databases.
Posted in bug bounty, Department of Defense, disclosure, Eric Fanning, Government, Hack the Army, Hack the Pentagon, HackerOne, Katie Moussouris, vulnerabilities, Web Security | Comments (0)
Yelp today announced a public bug bounty, which will pay up to $15,000 for critical vulnerabilities found on its mobile and desktop sites, public API and other areas of its infrastructure.
Posted in bug bounty, Featured, HackerOne, Martin Georgiev, private bug bounty, public bug bounty, vulnerabilities, Web Security, Yelp | Comments (0)
The biggest payout from United Airlines for his 20+ bugs was a 250,000 mile reward for an undisclosed flaw.
Posted in bug bounties, bug bounty, data loss, Olivier Beg, responsible disclosure, Security threats, United Airlines, Vulnerability | Comments (0)
Kaspersky Lab today at Black Hat USA 2016 announced the launch of a public bug bounty, one of the few offered by a software vendor in the computer security industry.
Posted in Alex Rice, application security, bug bounty, HackerOne, Kaspersky Lab, Kaspersky Lab bug bounty, private bug bounty, public bug bounty, Ryan Naraine, secure development lifecycle, Software security, Tavis Ormandy, vulnerabilities, vulnerability research, Web Security | Comments (0)
Portuguese researchers describe the pen-testing journey that led to Uber bug bounties – a good result for everyone.
Posted in bug bounty, Exploit, responsible disclosure, Uber, Vulnerability | Comments (0)
The Department of Defense last week released the results of the first Hack the Pentagon bounty program and 18-year-old David Dworken was among those who participated.
Posted in bug bounty, content injection vulnerabilities, Cross site scripting, David Dworken, Department of Defense, Government, Hack the Pentagon, HackerOne, vulnerabilities, Web Security | Comments (0)
The “Hack the Pentagon” bug bounty program by the United States Department of Defense (DoD) has been successful with more than 100 vulnerabilities uncovered by white hat hackers in Pentagon infrastructure.
In March, the Defense Department launched what it calls “the first cyber Bug Bounty Program in the history of the federal government,” inviting hackers to take up the challenge of
Posted in bug bounty, Department of Defense, Hack the Pentagon, HackerOne, hacking news, United States, Whitehat Hacker | Comments (0)
How to Hack Facebook?
That’s the most commonly asked question during this decade.
It’s a hacker dream to hack Facebook website for earning bug bounty or for any malicious purpose.
Facebook security team recently found that someone, probably a blackhat hacker with malicious intent, has breached into its server and installed a backdoor that was configured to steal Facebook employees’ login
Posted in bug bounty, Cross site scripting, Facebook account hacking, Hacking Facebook, How to Hack Facebook, remote code execution, server security, Vulnerability, website hacking | Comments (0)