bug bounty

Every major tech company out there has something called a bug bounty programme. Here those who find the vulnerabilities in the company’s offerings and notify them to the company instead of exploiting them are given cash rewards. Now being a hacker may sound thrilling, but if you get caught be prepared for an extended period behind bars. So the most logical thing to make sure that you get the thrill of hacking yet don’t land up in jail is to get into this bug bounty shebang.

Now, companies in the recent years have upped their bug bounty rewards to have more talented people read hackers come and instead of wreaking havoc on their system, just tell them about it. News has surfaced, that Uber, the ride-hailing start-up is currently on the process of announcing changes in its policy on how it awards cyber researchers who inform it about the flaws in its software. This is part of the start-up’s response to the widespread concerns that were raised about the way it handled its 20616 data breach.

John Flynn, Uber’s chief information security officer, informed: “We’re clarifying the difference between researchers that act in good faith and people who don’t.” Moreover, “We’re doing a better job about being explicit about what those things are, because it’s important these programs have high integrity.”

Uber will also make changes in its policies to categorically state that the company will not pursue or push any legal action against hackers who have approached their bug bounty programme in good faith via Uber’s “bug bounty” portal. Along with that assurance, it will also extend support to those bug bounty hackers who risk facing litigation from other entities due to their bug submission.

Hackers are the most misunderstood community on the Internet. Not all of them have nefarious motives or are bent towards causing harm to others. Yes, in recent years incidents have come to light that shows them in poor light, but hopefully, the public perception of them and the clear difference between white hat hackers and black hat hackers would be evident.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.