Friday, February 26, 15:28
Home security US to hackers: "Find vulnerabilities in our military networks"

US to hackers: "Find vulnerabilities in our military networks"

Hackers are called upon to uncover vulnerabilities in computer systems used by the U.S. military as part of the "Hack the Army" bug bounty program.

US military network hackers
US to hackers: "Find vulnerabilities in our military networks"

All hackers are invited to discover and reveal vulnerabilities in the US Department of Defense in a program managed by The Defense Digital Service (DDS) and HackerOne.

The goal is for cybersecurity investigators to discover and expose vulnerabilities in military systems so that they can be resolved before being discovered and exploited by malicious hackers. The hackers who will discover them security flaws will receive a financial reward.

"Bounty bug programs are a unique and effective power multiplier for preserving critical networks, systems and data "and are based on the efforts of Army and DoD security professionals," said Adam C. Volant, U.S. Director of Military Operations.

"With the help of the best moral hackers in the world who will identify our vulnerabilities, we will fix the systems us to be as much as possible safe done. Hack the Army 3.0 is based on the successes and lessons learned from previous programs bug bounty, ”He added.

The bug bounty program lasts from January 6, 2021 until February 17, 2021.

Hack the Army 3.0 is the XNUMXth DDS bug bounty program with HackerOne and the third with the US Army. Some of the previous programs are Hack the Pentagon, Hack the Defense Travel System and Hack the Air Force.

Participation in the bug bounty challenge of Hack the Army 3.0 is open upon invitation - to hackers and active US military personnel.


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehc
Be the limited edition.



Star Wars: Republic Commando is coming to PS4 and Nintendo Switch Ήταν το 1977 όταν ο George Lucas μας έβαλε στον φανταστικό κόσμο του Star Wars, μέσω...

Npower: Disables mobile app after credential stuffing attacks

One of the largest energy companies in the United Kingdom, Npower, was forced to disable its mobile app when it learned about a ...

Virtual Reality (VR): What is it and how does it change our lives?

We often hear the term Virtual Reality (VR) in innovations in the field of gaming. However, this technology is not limited to ...

Giant company Sequoia Capital reveals data breach

The American company VC, Sequoia Capital, reveals that it was attacked by a hacker. Since its establishment in 1972, the venture capital company ...

Wearable device turns your body into a "biological battery"!

Scientists have found a way to turn the human body into a "biological battery" through a low-cost, wearable device. Through a small ...

Facebook wants you to say "Hey Facebook" in Oculus Quest and Portal

Users with iPhone, iPad, Apple Watch or Mac can interact with Siri without even touching the device ...

Oxford University: Hackers invade COVID-19 research labs

One of the world's leading biology laboratories investigating COVID-19 has suffered a data breach. This is Oxford University, ...

Amazon: Cameras in Delivery Trucks - Drivers Dissatisfied

For Kamille Elizabeth, who delivers Amazon packages to Wilmington, Delaware is a great place to live. It has traditions ...

Apple starts selling refurbished Mac Mini with M1 chip

Apple today began selling certified refurbished Mac mini models with the M1 chip for the first time in the United States and ...

Elon Musk confirms "high demand" for Tesla Model S / X

Elon Musk confirmed that Tesla has received "high demand" for the new updated Model S and Model X.