Microsoft challenges researchers to hack Azure Sphere software for P5 million | Inquirer Technology

Microsoft challenges researchers to hack Azure Sphere software for P5 million

/ 05:30 PM May 08, 2020

Microsoft

Microsoft opens up the Azure Sphere Security Research Challenge offering $100,000 bounties. Image: courtesy of Microsoft Security Response Center via AFP Relaxnews

Microsoft’s Azure Sphere, a Linux-based IoT (Internet of Things) security solution that the company describes as a “comprehensive IoT security solution delivering end to end security across hardware,” was designed to be impossible to hack, and to be sure that statement is true, Microsoft is inviting people to do just that: to hack the platform before the bad guys do.

This Azure Sphere Security Research Challenge spans three months starting on June 1, and if someone manages to execute certain tasks, they’ll be rewarded with $100,000 (P5.05 million).

ADVERTISEMENT

Sylvie Liu, the security program manager at Microsoft’s Security Response Center, outlined the two bounty-winning scenarios as gaining the ability “to execute code on Pluton” or “execute code on Secure World,” both of which are specifically related to the Azure Sphere OS.

FEATURED STORIES

To partake in this challenge, interested participants must fill out an application that needs to be submitted before May 15. Naturally, physical attacks are not permitted. The challenge closes on Aug. 31. CL /ra

RELATED STORIES:

Google teaches users how to conduct more effective searches

Microsoft’s cloud business helps offset pandemic woes

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TOPICS: Azure Sphere, hacking, Hardware, linux, Microsoft
TAGS: Azure Sphere, hacking, Hardware, linux, Microsoft

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.