Tuesday, October 27, 17:58
Home inet Apple: Pays new hackers $ 288.500 to discover 55 vulnerabilities

Apple: Pays new hackers $ 288.500 to discover 55 vulnerabilities

Apple: Pays new hackers $ 288.500 to discover 55 vulnerabilities: A huge one infringement security It could happen to any business, even large companies like Apple.

Apple: Pays new hackers $ 288.500 to discover 55 vulnerabilities
Apple: Pays new hackers $ 288.500 to discover 55 vulnerabilities

This is why white-hat hacker spend their days carving and looking for networks, while looking for any vulnerabilities they could pose to risk the private ones data of companies' customers.

Of course, it is not strange to hear about a white-hat hacker group mentioning 55 vulnerabilities in a single company, and it is even more strange when that company, in which the vulnerabilities were found, is Apple.

As stated by Ars Technica, a group of hackers led by the 20-year-old Sam Curry discovered the 55 vulnerabilities in the company's infrastructure. Of those 55 errors, 11 were described as "critical", meaning that Curry and his team could use them to collect personal information and data, or even e-mail and iCloud data.

Apple has processed almost half of the vulnerabilities reported by Curry and is committed to paying at least $ 288.500 to find these bugs. Curry also predicts that Apple may pay a larger amount, approximately $ 500.000, when it completes the research in all errors.

Apple: Pays new hackers $ 288.500 to discover 55 vulnerabilities
Apple: Pays new hackers $ 288.500 to discover 55 vulnerabilities

While this may seem like a huge amount to most, if we consider that a massive data breach can be avoided, this is a small price to pay.

Other researchers working with Curry include Brett Buerhaus, Ben Sadeghipour, Samuel Erb and Tanner Barnes. The team broke into the company for three months in Apple's bug bounty program, and wrote an extensive report detailing how the vulnerabilities were discovered. While it is a great exhibition, it is worth reading. You can find it here.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...

Australia: Enhances cybersecurity and privacy!

The Government of New South Wales in Australia has set up a task force to strengthen cybersecurity and protection ...