![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
. | ![]() |
. |
![]() by Richard Tomkins Washington (UPI) Aug 11, 2017
More than 200 vulnerabilities to U.S. Air Force IT domains were uncovered by white-hat hackers during a 24-day period earlier this year, the Air Force announced today. The 207 vulnerabilities were found from May 30 through June 23 by vetted U.S. and international hackers in a federal bug bounty program involving the Air Force and HackerOne, a hacker-powered security platform connecting organizations with the world's largest community of trusted hackers. "Every organization needs to identify and fix their software vulnerabilities," said HackerOne Chief Executive Officer Marten Mickos. "The most effective way is to ask the external world for help. "We've seen new levels of success with every federal bug bounty challenge and Hack the Air Force is no exception. Activating the global hacker community to shore up their digital defenses is enabling faster progress than ever before." According to HackerOne, more than $130,000 in bounties were paid to participating hackers for their discoveries. A total of 272 hackers participated in the program and scoured public-facing USAF IT domains for security vulnerabilities. They were paid between $100 and $5,000 per valid vulnerability reported. A 17-year-old earned the most during the program after filing 30 valid reports. HackerOne performed similar projects before for the Pentagon and the U.S. Army. "Adversaries are constantly attempting to attack our websites, so we welcome a second opinion -- and in this case, hundreds of second opinions -- on the health and security of our online infrastructure," Air Force Chief Information Security Officer Peter Kim said in a press release. "By engaging a global army of security researchers, we're better able to assess our vulnerabilities and protect the Air Force's efforts in the skies, on the ground and online."
![]() Beijing (AFP) July 17, 2017 Has Winnie the Pooh done something to anger China's censors? Some mentions of the lovable but dimwitted bear with a weakness for "hunny" have been blocked on Chinese social networks. Authorities did not explain the clampdown, but the self-described "bear of very little brain" has been used in the past in a meme comparing him to portly Chinese President Xi Jinping. Posts bearing the image ... read more Related Links Cyberwar - Internet Security News - Systems and Policy Issues
![]()
![]() |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |