Page 1

@StoretecHull

www.storetec.net

Facebook.com/storetec Storetec Services Limited

IT Industry Seeks Bounty Hunters It may be hard to envisage people who spend much of the day sat by computers in the manner of adventurers with pith helmets and guns, but Microsoft, Google and Facebook are seeking bounty hunters. The trophy the trio will be chasing is not an animal head hung on a wall, but what they describe as a "safer internet", a common cause for which they are willing to set aside their rivalry through the launch of bug bounty programme Hackerone.


It will work by providing cash rewards from $300 (ÂŁ186) and $5,000 (ÂŁ3,110) to those who discover holes in online security systems, although exceptional cases may see even larger rewards. This cash will either go direct to the individuals or to a not-for-profit organisation of their choice. People can enter from nearly any country in the world, bar those whose trade with the US is restricted, like Iran and North Korea. Those aged under 13 cannot enter unless parental consent is given.


This means, in effect, the companies are looking for 'friendly hackers', who will use their skills not to damage enterprises, but to protect them and thwart cyber criminals. Of course, this does not cover all aspects of IT security – just the online arena – while the effectiveness of the scheme remains to be seen. However, companies concerned about potential risks to their own data security, be it online or elsewhere, can use remote data storage methods coupled with the most up-to-date outsourced security to ensure they do not lose information or have it stolen or corrupted by hackers.


Microsoft's own concerns about security were highlighted earlier this week when it issued a warning that certain Windows, Lync and Office systems were at risk from "a remote code execution vulnerability that exists in the way affected components handle specially crafted TIFF images". If the user responded to the TIFF by opening a specially crafted email or image it could lead to cyber criminals gaining the same access rights as the user, meaning secure information could be compromised.


Storetec News/Blogs."http://www.storetec.net/news-blog/itindustry-seeks-bounty-hunters/". IT Industry Seeks Bounty Hunters. November 8, 2013. Storetec.

It industry seeks bounty hunters  

It may be hard to envisage people who spend much of the day sat by computers in the manner of adventurers with pith helmets and guns, but Mi...

Read more
Read more
Similar to
Popular now
Just for you