Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Price War: iDefense Doubles Bounty for Security Flaws

    By
    Ryan Naraine
    -
    July 28, 2005
    Share
    Facebook
    Twitter
    Linkedin

      LAS VEGAS—The decision by 3Com Corp.s TippingPoint division to pay for the rights to information on software vulnerabilities has triggered an immediate response from iDefense Inc., the company that previously held a monopoly on the flaw bounty business.

      Effective immediately, iDefense is doubling its pricing structure for vulnerability submissions and hiking the value of the incentive and retention reward programs.

      /zimages/2/28571.gifPaying for flaws has been paying off for iDefense. Click here to read more.

      In addition, the VeriSign-owned company announced the launch of a new growth reward program that offers lump sum payments for hackers who continue to increase their level of participation in the controversial VCP (Vulnerability Contribution Program).

      The bounty increases come just days after TippingPoints launch of the Zero Day Initiative, a program that pays researchers for data on vulnerabilities. The company said ZDI will promote responsible disclosure by working closely with affected vendors to get patches created before the flaws are made public.

      /zimages/2/28571.gifDoes paying for flaws undermine security? Click here to read more.

      Neither company will say how much it pays for the flaw information, but Ziff Davis Internet News has learned that proof-of-concept exploit code for a code execution bug in a product like Microsoft Corp.s Internet Explorer browser could earn the flaw finder more than $6,000.

      That price automatically doubles with iDefenses latest move, which is likely to prod TippingPoint into matching.

      iDefense Labs Director Michael Sutton said the expansion of the VCP will immediately offer “substantively increase[ed] pricing.”

      “First off, effective immediately, we will be doubling our standard pricing structure for vulnerability submissions. As always, in order to obtain a price quote, we require that a contributor first submit a discovery to contributor@idefense.com. Once accepted, we will gladly provide a price quote and forward the appropriate contract,” Sutton said in a notice posted on a popular security mailing list.

      He also announced the sweetening of the pot for the iDefense rewards program, which provides an incentive to the top five contributors each year. The biggest contributor can now earn a $10,000 incentive, up from $5,000.

      The iDefense incentive program, which rewards the top three vulnerability contributors each quarter, has also been increased by up to $2,000.

      Sutton said a new Growth program will also be implemented to reward contributors who increase their level of participation in the VCP.

      The burgeoning competition between iDefense and TippingPoint was being discussed in the hallways of the Black Hat Briefings here. TippingPoint is using the conference to drum up hacker interest in its new program and, for the most part, researchers welcomed the opportunity to earn money for flaw discoveries.

      “If they keep upping the price, more power to us,” said one researcher who has submitted vulnerabilities anonymously to iDefenses VCP. “Im pretty sure the highest bidder will win the day because these guys need to earn money.”

      Officials from Microsoft Corp.s security response center were also paying close attention to the news. In an interview, MSRC Director Kevin Kean said Microsoft supports any initiative that promotes the responsible disclosure of vulnerabilities.

      “If its a program in place to allow us to get an update out to customers before it becomes a big risk, were happy to see that,” Kean said.

      “There are two things that we want. We want to know about the vulnerability as early as possible. And we want to know about it responsibly. If these companies report things to us in a responsible way and work closely with us to get customers protected, were happy.”

      Asked if Microsoft would consider a bounty program of its own, Kean said, “At this time, we dont think paying for vulnerabilities is what we should be doing.”

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ryan Naraine
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×