Facebook offers rewards to security bug hunters | Inquirer Technology

Facebook offers rewards to security bug hunters

/ 03:47 PM July 30, 2011

WASHINGTON—Facebook began offering rewards of $500 or more on Friday to security researchers who identify vulnerabilities in the social network.

“To show our appreciation for our security researchers, we offer a monetary bounty for certain qualifying security bugs,” Facebook said in a blog post.

Security researchers who are the “first person to responsibly disclose” a bug that could “compromise the integrity or privacy of Facebook user data” would be eligible for a bounty of $500, Facebook said.

Article continues after this advertisement

“Our security team will assess each bug to determine if it qualifies,” Facebook said.

FEATURED STORIES

The Palo Alto, California-based social networking titan said a typical bounty was $500 but it “may increase the reward for specific bugs.”

Facebook last month hired George Hotz, a celebrated hacker known as “GeoHot,” but has not disclosed what he is doing for the company.

Article continues after this advertisement

Hotz was sued by Sony for hacking the Japanese company’s PlayStation 3 game console and is credited with being the first person to go public with a way to hack into an iPhone.

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: bugs, Facebook, hacking, security
TAGS: bugs, Facebook, hacking, security

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.