(A rewards program.....perhaps they should call this a "Frequent 'sploiter
Program"?  I wonder if they're going to partner with any credit cards,
hotels or car rental companies so we can accrue points faster.........rf)


Offering a bounty for security bugs

By Joris Evers
http://news.com.com/Offering+a+bounty+for+security+bugs/2100-7350_3-5802411.
html

Story last modified Sun Jul 24 21:55:00 PDT 2005



Found a security bug? TippingPoint will pay you for the details.

TippingPoint--part of 3Com--is soliciting hackers to report vulnerabilities
in exchange for money. If a valid bug is found, TippingPoint will notify the
maker of the flawed product and update its security products to protect
users against exploitation of the flaw until an official patch is released.

"We want to reward and encourage independent security research, promote and
ensure responsible disclosure of vulnerabilities and provide 3Com customers
with the world's best security protection," David Endler, director of
security research at TippingPoint, said in an interview.

Austin, Texas-based TippingPoint sells intrusion prevention systems, which
are designed to protect against vulnerabilities, on servers, desktops and
other computers connected to an organization's network.

The payments are being offered under TippingPoint's new "Zero Day
Initiative." The company plans to announce the program on Monday and
celebrate the launch with a party in Las Vegas on Wednesday, the first day
of the annual Black Hat Briefings, an event for security professionals and
enthusiasts.

Few companies offer rewards for pinpointing software vulnerabilities. The
rewards are almost always paid by security companies for flaws in other
companies' software products. The payouts are used to gain a competitive
edge over rivals by having their products recognize more vulnerabilities.

Security intelligence company iDefense, which was recently acquired by
VeriSign, and the Mozilla Foundation also pay security researchers, or
hackers. Mozilla offers $500 and a Mozilla T-shirt to those who find
critical security flaws in its products, which include the Firefox Web
browser.

Money has increasingly become an incentive for hackers. Program's such as
TippingPoint's offer a legitimate way for them to get paid for their bug
hunting. There is also an underground market for information on
vulnerabilities. Cybercriminals pay top dollar for previously undisclosed
flaws that they can then exploit to break into computer systems, experts
have said.

Bugs can be reported to TippingPoint through the Zero Day Initiative Web
site. TippingPoint investigates all reports and will deal only with
reputable researchers, Endler said. "We need to know exactly who we are
working with," he said. "We don't want to work with black hats or illegal
groups." The term "black hat" is used to describe criminal hackers.

If a flaw is found to be genuine, TippingPoint will make an offer. The
amount depends on the scope of the vulnerability. A problem that lets an
attacker remotely access a computer will fetch more than a bug that could
only crash a system, for example. If the researcher takes the offer, the
rights to the bug report are signed over to TippingPoint, Endler said.

An unspecified time after protecting its own customers and before a fix is
released, TippingPoint plans to share vulnerability details with other
makers of intrusion prevention products. "We're making an altruistic gesture
to protect a larger segment rather than just our customer base," Endler
said.

Those who report flaws to TippingPoint will get credit for their discovery
and can keep track of the status of the bug report through the Zero Day
Initiative Web site, Endler said. A special reward program makes it
lucrative to contribute multiple vulnerabilities, he said.




You are a subscribed member of the infowarrior list. Visit 
www.infowarrior.org for list information or to unsubscribe. This message 
may be redistributed freely in its entirety. Any and all copyrights 
appearing in list messages are maintained by their respective owners.

Reply via email to