Something to look forward to: Apple is looking to ramp up its devices' security by providing special iPhones to security researchers for finding weaknesses in iOS. The invite-only bug bounty program is expected to be announced at the Black Hat security conference, through which researchers will be rewarded for the iOS bugs they disclose to Apple. According to Forbes, the company is also planning a similar program for macOS.
Many organizations and tech companies such as Facebook, Google and Microsoft have bug bounty programs in place to reward security researchers for finding vulnerabilities and exploits in their products. Those who report the bugs are compensated with cash rewards and recognition in the industry.
http://www.kgberlin.de/forum/viewtopic.php?f=1&t=47022
http://www.basketferentino.com/forum/viewtopic.php?t=101179
http://www.labsimdev.org/phpBB3/viewtopic.php?t=182985
http://scifidig.com/forums/showthread.php?tid=4514&pid=4750
http://digilohas.com/phpbb/viewtopic.php?f=2&t=77017
http://cichlide.forumprofi.de/showthread.php?tid=24574
http://lost-mc.net/forums/showthread.php?tid=42402
http://www.aslclub.com/phpbb/viewtopic.php?f=2&t=592360
http://xenile.com/forum/viewtopic.php?f=1&t=268041
http://www.dnipro-ukr.com.ua/forum/viewtopic.php?f=2&t=59920
It seems like Apple, which traditionally has been very tight-lipped about its offerings, will now open up its products to researchers by launching a bug bounty program for iOS and macOS. Forbes reports that the company is going to make an announcement at the Black Hat security conference in Las Vegas later this week. Through this program, Apple will further be able to bolster the security of its iPhones and Macs.
Invited researchers will receive special iPhones from Apple. Think of them as "dev devices," says one source with knowledge of the company's announcement. These devices will "allow the user to do a lot more than they could on a traditionally locked-down iPhone. For instance, it should be possible to probe pieces of the Apple operating system that aren’t easily accessible on a commercial iPhone. In particular, the special devices could allow hackers to stop the processor and inspect memory for vulnerabilities."
http://businesskool.com/forum/viewtopic.php?f=1&t=96815
http://mundo.osyley.com/viewtopic.php?t=434732
http://www.arcieridellanotte.it/forum/viewtopic.php?f=2&t=56170
http://profipol.dp.ua/forum/viewtopic.php?t=17709
http://cskurnik.eu/showthread.php?tid=55142
http://www.bahishane1.com/showthread.php?tid=8748
http://like.pl/forum/viewtopic.php?f=8&t=43554
https://forum.solarbotics.com/viewtopic.php?f=8&t=7433&p=33076
http://fear-some.com/forums/showthread.php?tid=351624&pid=368095
http://www.mybbindonesia.com/showthread.php?tid=40287
http://petersobol.com/forum/viewtopic.php?f=7&t=191950
http://vansirc.net/forum/viewtopic.php?f=4&t=1583679
http://qrucgen.graffici.ca/dossiers/trois-generations-aux-vagues-vertes-5166/
These special iPhones would still be locked in places, unlike the models used by Apple's internal security team and developers. For instance, Apple is unlikely to let researchers decrypt the firmware on its iPhones that are part of this program.
It's important here to mention the announcement of a bug bounty program launched by Apple back at Black Hat 2016. During that conference, Ivan Krstić, Apple's head of Security Engineering and Architecture, showed a slide consisting of five categories and their respective payments. The same program came under light to discuss the eligibility of a teen who discovered a bug in Apple's FaceTime feature earlier this year
http://vh6.nethosting.com/~nancy67/blog/?id=2043&showEntry=1
http://blog.cleverly.com/permalinks/71.html
http://kernen.plattsalat.de/p/home/articles/43/
Comments
Post a Comment