Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 27 |
Nodes: | 6 (0 / 6) |
Uptime: | 35:44:58 |
Calls: | 631 |
Calls today: | 2 |
Files: | 1,187 |
D/L today: |
22 files (29,767K bytes) |
Messages: | 172,999 |
Lots of rewards for white hats...
https://www.youtube.com/shorts/Lfjeo8HzkvY
Apple has increased its bug bounty for security vulnerabilities in iPhones to a[end quoted "search assist"]
maximum of $2 million, with potential bonuses that can raise the total payout to
over $5 million for complex exploits. This initiative aims to encourage security
researchers to identify and report vulnerabilities in their devices. Tom's >Hardware scworld.com
Apple Security Bounty Program Overview
Apple has significantly increased its bug bounty rewards for discovering >vulnerabilities in its devices, particularly the iPhone. The program aims to >enhance security by encouraging researchers to identify and report bugs.
Key Features of the Bounty Program
Attribute Details
Maximum Up to $2 million for critical vulnerabilities, with potential
Reward bonuses raising total to $5 million.
Types of - Zero-click remote code execution (RCE) flaws- Multi-step Vulnerabilities exploit chains- Lockdown Mode bypasses
Smaller Rewards - Up to $1 million for iCloud security flaws- Up to $300,000
for WebKit sandbox escapes- Up to $1 million for wireless
proximity exploits
Submission Researchers can submit reports online and receive
Process updates on their status.
Review Timeline Most reports are resolved within 90 days.
Additional Program Details
Apple has awarded over $35 million to more than 800 researchers since 2020.
The program includes a new feature called "Target Flags" to help researchers
demonstrate the exploitability of vulnerabilities, speeding up the
verification process.
The initiative is part of Apple's broader strategy to protect users from
sophisticated cyber threats, including those from spyware vendors and nation-
state hackers.
This bounty program not only incentivizes ethical hacking but also helps Apple >maintain the security of its devices and services.
scworld.com Tom's Hardware