sb-as logo
Story image

Kaspersky Labs offers $50,000 'bug bounty' to security researchers

02 Aug 2016

Security researchers Kaspersky Lab and bug bounty platform Hacker One are co-launching a Bug Bounty Program that offers $50,000 in bounty rewards to eagle-eyed security researchers who find and disclose security vulnerabilities to companies.

“Vulnerabilities are inevitable and bug bounty programs are proven to supplement traditional security best practices with the help of the incredibly diverse global hacker community. We look forward to partnering with Kaspersky Lab to help them run the most competitive bug bounty program and continue to protect customers," says Alex Rice, CTO and co-founder of HackerOne.

The Kaspersky Lab bug bounty program begins today and will last for six months. Bug bounty hunters will 'examine our flagship products for consumers and enterprises, Kaspersky Internet Security and Kaspersky Endpoint Security', the company states.

Kaspersky Labs will then analyse results to find out what additional features should be included in the second phase of its program.

Kaspersky Lab says the use of bug bounty programs are effective incentives to get external researchers to speak up about bugs and fix them without putting customers at risk. The company also hopes to learn from the exercise, with plans to further develop relationships with security researchers as well as strengthening its own mitigation strategies.

“Our bug bounty program will help amplify the current internal and external mitigation measures we use to continuously improve the resiliency of our products. We think it’s time for all security companies, large and small, to work more closely with external security researchers by embracing bug bounty programs as an effective and necessary tool to help keep their products secure and their customers protected," says Nikita Shvetsov, chief technology officer, Kaspersky Lab.

Find out more about the program's scope, eligibility, rewards, exceptions and rules here

Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More
Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
UiPath and eSentire bring hyperautomation to Microsoft Security
UiPath and eSentire have announced a strategic partnership to deliver end-to-end security policy automation across multiple Microsoft Security services.More
Story image
Zoom to begin rolling out end-to-end encryption
Available starting from next week, it represents the first phase out of four of the company’s greater E2EE offering, which was announced in May following backlash that the company was lax on its security and privacy.More
Link image
Why the threat of ransomware requires quality resources to keep it at bay
With this ransomware prevention kit, learn actionable tactics for IT departments on how to manage backups and enable staff so that ransomware is a managed and controlled risk.More