Tuesday, October 27, 20:18
Home inet Apple announces the rules of its bug bounty program

Apple announces the rules of its bug bounty program

bug bounty

Faithful to the announcement he made last August at the Black Hat Security Conference in Las Vegas, Apple officially launched its bug bounty program on Friday, for all of them researchers.

To date, the company has only run bug bounty programs for selected researchers and only accepted security bugs for iOS.

With its new program, Apple will accept vulnerability reports for a much wider range of products that will include iPadOS, MacOS, tvOS, watchOS and iCloud.

In addition, the company has increased the maximum reward, from $ 200.000 to $ 1.500.000, depending on the complexity and severity of the vulnerability chain.

Along with the official announcement of its new program, Apple has also posted a new page on its website detailing the bug bounty rules for the main bugs, as well as a breakdown of the rewards given to researchers based on their findings.

These are pretty strict rules, which set the bar high for those who want to win top rewards. To be a researcher eligible for top prizes and bonuses, he must submit clear reports. These include:

  • Detailed description of the problems discovered.
  • Any conditions and steps can affect the system.
  • A reliable finding for the discovery he cites.
  • Enough information so Apple can reproduce the problem.

The errors Innovative security that impacts multiple platforms, working with the latest hardware and software and affecting sensitive system components will give a researcher a greater chance of earning the top $ 1,5 million reward.

Still, vulnerabilities to be identified in versions beta will be rewarded just as well. Apple says it will add a 50% bonus over the reported payout, for any bugs found in a beta.

Ο λόγος για τον οποίο τα σφάλματα στις εκδόσεις beta δίνουν υψηλές αμοιβές  είναι επειδή αυτές οι αναφορές σφαλμάτων επιτρέπουν στην Apple να διορθώσει σημαντικά ελαττώματα ασφαλείας πριν φθάσουν σε εκδόσεις παραγωγής του λογισμικού της, όπου θα επηρεάσουν δισεκατομμύρια συσκευές.

Apple's bug bounty program will also give a 50% bonus for regression errors. These are bugs that Apple had previously fixed in earlier versions of its software, but have been reintroduced into the code at a later stage.

The vulnerabilities that allow attacks without a click or a single click are the ones that will bring the most money to researchers. However, Apple requires the full chain of operation for these types of errors.

If, for example, one of these attacks uses three different errors linked together, the researcher will have to submit the full exploitation chain that incorporates all three errors, and not just one, if he or she wants to gain the maximum reward.

For more details on Apple's new bug bounty program, visit the official website the company's.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Miahttps://www.secnews.gr
Being your self, in a world that constantly tries to change you, is your greatest achievement



Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...