Skip to main content

United hackers given million free flight miles

The flight provider operates a "bug
bounty" scheme that rewards hackers for
privately disclosing security flaws rather
than sharing them online.
It has given the maximum reward of a
million flight miles, worth dozens of trips,
to two people.
One security expert said the scheme was a
big step forward for online security.
"Schemes like this reward hackers for
finding and disclosing problems in the
right way. That makes the internet safer
for all of us," said security consultant Dr
Jessica Barker.
"Bug bounties are common in tech
companies as they tend to understand
online security a bit more, but other
industries are catching up," said Dr
Barker.
Cash incentives
The idea of responsible disclosure,
reporting issues and giving companies
time to fix them, is not new.
Big technology companies such as Yahoo,
Google and Facebook offer hackers cash
incentives to report bugs privately.
In return for receiving their flight
rewards, hackers are forbidden from
revealing the nature of the security holes
they discovered.
"We believe that this program will further
bolster our security and allow us to
continue to provide excellent service,"
United said on its website.
The company declined to comment
further.
"It's not always about hackers digging
around looking for flaws. A hacker may be
using a service and notice something a bit
off," said Dr Barker.
"We all benefit if they look into that," she
added.
Some critics of bug bounties say they can
discourage companies from hiring
professional security staff, because it's
cheaper to offer hackers cash for
disclosing bugs.
Dr Barker disagrees: "It should be part of
an overall approach to security, but it's
definitely a good approach.
"It encourages positive behaviour and
shows young hackers that they can benefit
from doing the right thing.
"Bounties can also benefit smaller
companies who can't afford to give out
cash rewards but can offer free products
or services, so I hope we'll see more and
more bug bounties," she said.

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...