T-Mobile Installs Anti-Eavesdropping Tech on US Network

For the past several months, T-Mobile has been quietly toughening up security on its mobile networks to prevent local and federal law enforcement agencies from eavesdropping without proper clearance. According to a report from the Washington Post earlier this week, the carrier (which just posted record growth in their Q3 financials) has been working diligently Read More

bug bounty

Twitter Partners With HackerOne To Launch Bug Bounty Program

Twitter has announced a new bug bounty rewards program earlier that will compensate security researchers for discovering and reporting security vulnerabilities in Twitter’s mobile apps and website. The program was introduced after Twitter’s partnership agreement with HackerOne, a third-party bug bounty program that offers a minimum of $140 per threat, and maximum reward for major Read More

German Security Researchers Win $50K Prize From Facebook

Facebook has awarded $50,000 to a pair of German Researchers, who developed a new way of detecting vulnerabilities in online applications. Thorsten Holz and Johannes Dahse, two researchers from Ruhr-Universität Bochum were given the award for their research paper ‘Static Detection of Second-Order Vulnerabilities in Web Applications.” The committee behind the award witnessed a ‘clear Read More

BugCrowd Releases Guidelines for Effective Bug Bounty Programs

This Friday, BugCrowd published a set of guidelines they believe will be the most effective way to attract skilled engineers and programmers to the world of whitehat Internet activism, wherein everyday hackers can utilize their deep toolbox of skills to assist companies in discovering zero-days and the process of patching them, rather than exploit the Read More

Russia Posts Open Bounty to Break Tor in Two

This week, the Russian Interior Ministry put out an open call for hackers from around the globe, and posted a large bounty for any freelance blackhats who could assist the former Soviet Union in breaking the code that makes anonymizing communications and web traffic possible. Totaling just short of four million rubles ($111,290 USD), the Read More


Hackers Prove That Tesla Cars Aren’t Safe From Attack

Internet connected cars are fun to drive, but they can have certain loopholes, making them fall prey to hackers. GM, Ford, Toyota, Tesla, and a few others have introduced a new generation of electric, Internet-enabled cars. These cars are largely known as safe, but are they really? Tesla owners recently received a wake-up call from Read More


Dominos Hacked for 600,000 User Passwords

Hand over the dough, and nobody gets hurt. Food puns aside, the loss of 600,000 user credentials is nothing to joke about. Dominos Pizza has announced the loss of a cache of usernames and passwords which belonged to customers in France and Belgium, claiming that an unknown group of hackers have attempted to extort them Read More

Win Mozilla’s $10,000 Bug Bounty for Upcoming Firefox Release

Mozilla is no stranger to bounties. They have provided bounty rewards for discovering bugs in their software in the past. Their “Bug Bounty Program” rewards individuals $500 for high severity and $3,000 for critical bugs. This is an ongoing offering, but it is separate from the recently announced $10,000 bounty. So what is this new Read More

Google Chrome Bug Bounty Leads to Discovery of 31 Flaws

Google has always been recognized for their higher level of security. Of course, a premium level of security cannot be established by just relying on a single company. Testing with different procedures and systems, using different analysis, tools, and so on, can all play a role in the efficiency of security flaw detection in any Read More

Older Posts