Archive for the ‘bug bounty’ Category
Posted in bug bounty, cyber security, data breach, data security, Facebook, Facebook account security, Facebook hacking tool, facebook vulnerability, hack facebook account, Vulnerability | Comments (0)
A security researcher has discovered a critical vulnerability in Facebook that could allow attackers to delete any video of the social networking site shared by anyone on their wall.
The flaw has been discovered by security researcher Dan Melamed in June 2016, allowing him not only to remotely delete any video on Facebook shared by anyone without having any permission or authentication but
Bug bounty program focuses on hardware exploits
The government announced its second bug bounty program called Hack the Army, which will concentrate on finding bugs in recruiting websites and databases.
Yelp today announced a public bug bounty, which will pay up to $15,000 for critical vulnerabilities found on its mobile and desktop sites, public API and other areas of its infrastructure.
The biggest payout from United Airlines for his 20+ bugs was a 250,000 mile reward for an undisclosed flaw.
Kaspersky Lab today at Black Hat USA 2016 announced the launch of a public bug bounty, one of the few offered by a software vendor in the computer security industry.
Posted in Alex Rice, application security, bug bounty, HackerOne, Kaspersky Lab, Kaspersky Lab bug bounty, private bug bounty, public bug bounty, Ryan Naraine, secure development lifecycle, Software security, Tavis Ormandy, vulnerabilities, vulnerability research, Web Security | Comments (0)
Portuguese researchers describe the pen-testing journey that led to Uber bug bounties – a good result for everyone.
The Department of Defense last week released the results of the first Hack the Pentagon bounty program and 18-year-old David Dworken was among those who participated.
Posted in bug bounty, content injection vulnerabilities, Cross site scripting, David Dworken, Department of Defense, Government, Hack the Pentagon, HackerOne, vulnerabilities, Web Security | Comments (0)