This is termed bug bounty hunting, with cash rewards for coders to find vulnerabilities in your applications and/or source code and report rather than exploit them. Large technology enterprises such as SAP … of the information security cyber industry …
Read full article here..
Related topicsNew click-to-hack tool: One script to exploit them all and in the darkness TCP bind them
You set this script running, it crawls the internet looking for machines that are possibly vulnerable to attack – typically due to unpatched security bugs […]Suim Correctly
What to be aware of when using SUIM SUIM has some bugs. That’s not surprising … Read our article: what to be aware when using […]Did You Test the Right Things? Test Gap Analysis Can Tell You [Video]
One is a hotfix test. This is an example from an SAP system. A patch was deployed and now you want to make sure that […]TED-speaker Keren Elazari uses Tieto’s VPN
Keren Elazari is a former hacker turned cyber security researcher who teaches at Singularity Unviersity … she said at the ThinkX conference in Stockholm this […]‘We’ve nothing to hide’: Kaspersky Lab offers to open up source code
The firm’s Global Transparency Initiative is in response to moves to ban the use of its technology on US government systems by the Department of […]