Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Microsoft Joins Bug-Bounty Movement After a Long Delay

    By
    Robert Lemos
    -
    June 19, 2013
    Share
    Facebook
    Twitter
    Linkedin
      Security Alert

      Breaking a longstanding moratorium on paying for information on vulnerabilities in its software products, Microsoft announced June 19 that the company has created two programs that will pay researchers for information on software flaws and a third that will reward researchers who create defensive measures.

      The software company will pay $100,000 to any researcher who develops a technique to bypass the defenses of the latest version of Microsoft’s operating system, Windows 8.1. In a second vulnerability-reward program, the company will also pay up to $11,000 for each bug found during the first 30 days of the beta period of its latest version of Internet Explorer, Katie Moussouris, senior security strategist lead for Microsoft’s Trustworthy Computing group, told eWEEK.

      “What we are looking for are new ways to bypass our mitigations,” she said. “We want to learn about these new ways to punch holes in our shields, so we can develop defenses that work platform-wide and block those types of attacks.”

      In addition to the two bug-bounty programs, Microsoft will also reward researchers who create novel ways to foil exploitation methods. Under its BlueHat Bonus for Defense program, also announced June 19, the company will award a $50,000 prize for techniques for blocking current attacks that bypass its defenses.

      The programs come after years of criticism by some researchers and hackers that Microsoft should solve its security problems by paying for bugs. For more than a decade, security researchers have bristled at reporting bugs to Microsoft for free. While the company made billions of dollars on its software, researchers complained that they were expected to provide free quality assurance in the form of bug reports, or face criticism for being irresponsible. For a number of years, Microsoft had referred to the vulnerability reporting process as “responsible disclosure,” if the researchers worked with the company to fix the issue before publicizing the flaw.

      “The first thing that comes to mind is that it’s about time,” Chris Wysopal, chief technology officer for application-security firm Veracode, told eWEEK. “All the other browsers have bug-bounty programs, and that fact may have been one of the things that pushed [Microsoft] over the edge.”

      Times have also changed: The market for information on vulnerabilities has matured, and now any researcher who finds a significant vulnerability in a popular software product has a number of ways to get paid—from selling the information to a white-market program, such as the Zero-Day Initiative, to using a broker to cut a six-figure deal with a government agency.

      Microsoft is feeling those changes. The company has courted researchers, creating a number of programs to strengthen the company’s relationship with bug finders, but even so, researchers are turning fewer vulnerabilities over to Microsoft for free. Three years ago, more than 90 percent of the vulnerabilities that the company fixed came directly from researchers. Now, that’s no longer true, said Moussouris.

      “The researchers themselves are changing how they choose to report; the data is really what tells the story here,” Moussouris said.

      Microsoft’s second program, the Internet Explorer 11 Preview Bug Bounty Program, is an attempt to change researcher behavior. In the past, researchers typically found and mainly reported vulnerabilities in Internet Explorer only after the software was released. By paying for bugs only during the first 30 days of the preview of Internet Explorer, Microsoft hopes to shift that behavior, so it can fix the software before its release.

      “It’s a good idea,” Wysopal said. “If they are paying researchers to do their quality assurance, why not pay them to do it in the actual QA period, rather than after the product is released and you would have to issue a patch,” he said.

      Robert Lemos
      Robert Lemos is an award-winning freelance journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×