Apple To Offer Hundreds Of Thousands Of Dollars In Security Bounty Program
On Thursday, August 4, Apple announced at the Black Hat cyber security conference in Las Vegas its first ever security bounty program.
According to Apple Insider, the new initiative of the maker of iPads and iPhones will pay out cash for previously undiscovered hardware and software vulnerabilities. The Verge reports that Apple's bug bounty program will go live in September.
When the program will become operational, security researchers will be able to get bounties or cash rewards for probing Apple's latest products for weaknesses and handing over working exploits.
Many other industry organizations as well as smaller companies have already implemented their own bug bounty incentives. Such rewards are currently offered by dozen of companies, including Facebook Inc, Microsoft Corp, AT&T Inc, Google, Yahoo Inc and Tesla Motors Inc. Apple is among the last major consumer electronics brands that decided to move away toward public incentives from its previous internal testing policies and procedures.
Business Insider reports that researchers who find critical security bugs in Apple products will receive rewards of up to $200,000. Apple's security bounty program includes some of the biggest bounties offered to date.
Initially, Apple's program will be limited to around two dozen researchers. They will be invited by the high-tech company to help identify hard-to-uncover security bugs. The focus of the program will spread on five specific categories.
Apple has chosen the researchers who will participate in its bug bounty program from the group of experts who have previously helped Apple identify bugs without being compensated for that work. The category that will offer the biggest rewards is the one searching for bugs in Apple's "secure boot" firmware. When an iOS device is powered up, the firmware aims to prevent unauthorized programs from launching.
Apple explained that at the advice of other companies that have launched previously similar programs, it decided to limit the scope of the program. The high-tech company will start by inviting a small list of researchers to join and open the security bounty program gradually over time.
Apple MacBook Pro 2016 News & Update: Most Rumors Might Prove Wrong
Most rumors and speculations regarding Apple's upcoming MacBook Pro 2016 might prove wrong.
Apple Releases TV Remote App For iPhone
Apple unveils an app for iPhone that allows control of the Apple TV by using the AI assistant Siri.
Apple's New Ad Promotes iPad Pro As Full Computer
In new commercial ad, Apple highlights the fact that its iPad Pro can be considered a full computer.
iOS 11 Plagued with Untested Bugs and Early Adoption Pitfalls
Reports of nagging iOS 11 issues have started pouring in just a day after the software was released by Apple on supported devices.
iPhone 8 Outperforms iPhone X in Early Geekbench Tests [Photos]
Quite surprisingly, the iPhone 8 beats the iPhone X in both Single Core and Multi-Core Geekbench tests.
MORE IN ITECHPOST
12 Self-Publishing Platforms for Authors
Self-publishing has become an incredible opportunity for writers to connect with an unlimited number of potential customers. While there are numerous platforms available, which ones are the best?
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Game Developers’ Different Roles in the Studio
Learn about the different professionals involved in developing video games. Becoming a game developer is one of the coolest jobs around and your 14-year-old self, perched on the edge of your bed as you play PlayStation, will thank you for making such an awesome career move.