Find a Windows 8.1 Exploit, Earn $100,000
Microsoft says it's willing to pay security researchers $100,000 for helping them discover and prevent attacks on the firm's upcoming Windows 8.1 (otherwise known as 'Windows Blue').
The reward is part of a new campaign designed to beef up the security defenses of Microsoft products.
One part of this new campaign is being called "BlueHat Bonus for Defense," which is based on a 2011 contest where Microsoft rewarded security researchers with a "BlueHat Prize".
The new BlueHat Bonus for Defense project will offer up to $50,000 for new security ideas related to Microsoft products. (Source: computerworld.com)
Big Bounty for Finding Windows Blue Exploits
A second part of the campaign is known as the "Mitigation Bypass Bounty," and doubles the potential reward to $100,000. To win that much cash, security experts will need to devise a complex technique for getting around Windows 8.1's advanced security defenses.
Specifically, researchers will need to clearly demonstrate that their methods are capable of circumventing Windows 8.1's security systems, including DEP (Data Execution Prevention), ASLR (Address Space Layout Randomization), and SEHOP (Structured Exception Handling Overwrite Protection).
According to Microsoft's statement on the subject, eligible submissions must include "an exploit that demonstrates a novel method of exploiting a real Remote Code Execution (RCE) vulnerability and a white paper explaining the exploitation method." (Source: computerworld.com)
Academics Expected to Provide Bulk of Submissions
It's expected that most submissions for the aforementioned prizes will come from academics, such as Hovav Schacham, who in 2007 unveiled an exploit technique that would have garnered the University of California computer science professor the $100,000 prize.
Schacham's revelation was called Return Oriented Programming. It's a technique that could be used by a hacker to execute code and hijack a targeted Windows system.
As for the new program's popularity, security expert Andrew Storms says "we don't know how many [submissions] they'll get."
According to Veracode chief technology officer Chris Wysopal, the program is long overdue. "The first thing that comes to mind is that it's about time," Wysopal said. (Source: eweek.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.