MASIGNCLEAN104

Hack'em If You Lot Tin Plough Over The Axe — U.S. Air Strength Launches Põrnikas Bounty Program

iklan banner
 With the growing disclose of information breaches as well as cyber attacks Hack'em If You Can — U.S. Air Force launches Bug Bounty Program
With the growing disclose of information breaches as well as cyber attacks, a pregnant disclose of companies as well as organizations select started Bug Bounty programs for encouraging hackers as well as põrnikas hunters to detect as well as responsibly study vulnerabilities inward their services as well as larn rewarded.

Now, next the success of the "Hack the Pentagon" as well as "Hack the Army" initiatives, the the States Department of Defense (DoD) has announced the launch of the "Hack the Air Force" põrnikas bounty program.

Hacking or breaking into Defense Department networks was illegal once, precisely later on "Hack the Pentagon" initiative, the DoD started rewarding outsiders to finding as well as reporting weaknesses inward its somebody networks.
"This is the kickoff fourth dimension the AF [Air Force] has opened up...networks to such a broad scrutiny," Peter Kim, the Air Force Chief Information Security Officer said inward a statement. "We select malicious hackers trying to larn into our systems every day."

"It'll locomote overnice to select friendly hackers taking a shot and, virtually importantly, showing us how to ameliorate our cyber safety as well as defense forcefulness posture. The additional participation from our partner nations greatly widens the diversity of sense available to detect additional unique vulnerabilities."
The "Hack the Air Force" programme is directed past times HackerOne, the põrnikas bounty startup that was behind Hack the Pentagon, as well as Luta Security, the safety consulting companionship driving the U.K. program.

Hackers From The Five Eyes Nations Are Invited


This programme volition locomote the DoD's largest põrnikas bounty projection equally it invites experts as well as white chapeau hackers non alone from the United States, precisely too from remaining Five Eyes countries: the United Kingdom, Canada, Commonwealth of Australia as well as New Zealand.

So, alone Hackers as well as põrnikas hunters from the Five Eyes intelligence alliance are eligible to participate inward Hack the Air Force.
"This exterior approach – drawing on the talent as well as expertise of our citizens as well as partner field citizens – inward identifying our safety vulnerabilities volition aid bolster our cyber security," said Air Force Chief of Staff Gen. David L. Goldfein.

"We already aggressively send exercises as well as 'red team' our world facing as well as critical websites. But this side past times side footstep throws opened upward the doors as well as brings additional talent onto our cyber team."

Only Vetted Hackers Can Participate


Only "Vetted Hackers" tin participate inward Hack the Air Force program, which agency the candidates must overstep a rigorous background examination later on registration as well as select a build clean criminal tape inward society to participate inward the program.

However, according to roughly critics, this procedure excludes many talented hackers as well as põrnikas hunters, precisely this is ane of the mutual atmospheric condition across all of the Pentagon's põrnikas bounty programs.

Registration for "Hack the Air Force" volition start on May xv as well as interested participants should register through HackerOne. The rival volition launch on May thirty as well as terminal until June 23.

The kickoff DoD põrnikas bounty program, "Hack the Pentagon," came inward Apr 2016, inward which over 14,000 participating hackers constitute 138 vulnerabilities inward DoD systems as well as were awarded over $75,000 inward bounties.

Just similar Bug Bounty programs offered past times several Frontliners inward the applied scientific discipline industry, Hack the Air Force is too an practice for the federal government to boost upward their safety measures as well as counter the cyber attacks.
Share This :