Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Development
    • IT Management
    • Networking

    Secunia Offers Noncash Rewards for Software Vulnerabilities

    By
    Fahmida Y. Rashid
    -
    November 2, 2011
    Share
    Facebook
    Twitter
    Linkedin

      Secunia launched a program to help coordinate reporting and resolving vulnerability disclosures by security researchers.

      Researchers can submit software vulnerabilities discovered in off-the-shelf products to the Secunia Vulnerability Coordination Reward Program, Secunia said Nov. 2. Flaws in online services and Web applications do not qualify, according to the company. Under the program, Secunia will validate the researchers’ findings and handle the disclosure with the vendors on their behalf.

      While many organizations offer bug-bounty programs to pay researchers for vulnerabilities they uncover, there are many more that don’t offer any rewards beyond acknowledging the researcher who discovered the bug when announcing the patch. Many researchers also want an independent third-party to confirm the vulnerability and to handle the back-and-forth with the vendor to get the issue resolved. Under Secunia’s program, researchers would designate the Danish company as the point-of-contact with the vendor.

      “The fun part of vulnerability research is the actual process of discovering and understanding the vulnerabilities as well as creating proof of concepts or exploits-and not the sometimes extensive coordination and liaison process that follows” to fix the problem, said Carsten Eiram, chief security specialist at Secunia.

      Any researcher who discovered a software vulnerability can sign up with the SVCRP, provided that the vulnerability was found in the stable and most recent version of the product. The product also has to be actively supported by the vendor and the vulnerability disclosed cannot be already publicly known, Secunia said. The program does not require researchers to provide a working exploit for the security flaw.

      After Secunia’s team has independently verified the vulnerability, the researcher will receive nonmonetary rewards from the company. Secunia would then handle future communication with the vendor to disclose the issue, provide detailed information on the problem, work with the vendor to identify a fix and test the patch to ensure the issue has been resolved. Working with Secunia would also add weight to the researcher’s findings because it had been independently corroborated, Secunia said.

      “We will both confirm vulnerability discoveries and handle the coordination process, allowing researchers to focus on the more exciting aspects of vulnerability research,” Eiram said.

      The new program joins the ranks of similar initiatives such as HP TippingPoint’s Zero Day Initiative and Verisign’s iDefense Labs Vulnerability Contributor Program. ExploitHub also launched a new program for researchers to develop exploits for a dozen client-side vulnerabilities in Microsoft Internet Explorer and Adobe Flash Player in October. With these programs, researchers don’t have to deal with vendor-disclosure policies or the inevitable back-and-forth communication to get the flaws fixed.

      Secunia does not plan to compete with the other programs, but to serve as a “complementary service,” according to Eiram. For many of these programs where researchers are paid bounties, vendors are “very selective” about the kind of vulnerabilities they would accept, Eiram said. Secunia fills the gap for those researchers who discover vulnerabilities that don’t fit vendor requirements but still should be disclosed and addressed.

      Secunia had coordinated vulnerability disclosures for some researchers on an “informal basis” in the past, according to Eiram. The program formalizes the process to encourage more researchers to participate, he said.

      Secunia would not offer cash, but will offer various kinds of merchandise and passes to conferences, the company said. Secunia will also offer special prizes for researchers who reported the most interesting vulnerabilities and the one who submitted the best-quality reports throughout the year.

      Theoretically, security researchers would continue to receive payments they are entitled to receive directly from the vendor even if the vulnerability was reported through Secunia’s program. However, some companies, such as Google, explicitly state within their program guidelines that vulnerabilities disclosed through brokers and other third-party programs may not be eligible to receive a bounty.

      Fahmida Y. Rashid
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×