Feeds

Facebook dangles cash rewards for bug reports

Microsoft, Oracle, you listening?

Internet Security Threat Report 2014

Facebook has joined Google and Mozilla in paying cash rewards to researchers who privately report vulnerabilities that could jeopardize the privacy or security of their users.

The social network said Friday it would pay $500 for the disclosure of most website flaws, such as XSS, or cross-site scripting errors. The company may pay more for specific bugs, which weren't elaborated on in Facebook's announcement. To qualify, the researcher must be the first person to privately report the bug and reside in a country not under any current US sanctions.

The move comes as good news to legions of researchers who spend considerable time and expertise finding and reporting serious vulnerabilities in the websites and software they use. More often than not, they receive little more than a public acknowledgement in return. Microsoft, Oracle and virtually every other software manufacturer and website steadfastly refuse to pay for private bug reports, even though their products also benefit from it.

Microsoft recently offered a $250,000 reward for information that leads to the conviction of the operators of Rustock, a recently dismantled botnet that in its heyday was one of the biggest sources of illegal spam. Although the software maker has rebuffed calls to offer cash rewards for bug reports, it has publicly pledged not to sue or press charges against hackers who responsibly find security flaws in its online services.

Mozilla was among the first software makers to offer a bug bounty program when, years ago, when it began offering $500 rewards. Google eventually followed suit. The two outfits have gradually increased the bounties, which Mozilla paying as much as $3,000 and Google paying $3,133.70 for the most serious bugs.

To date, Google has paid $300,000 under the program for bugs found in its its various web properties. That doesn't include bounties paid for vulnerabilities reported in Google's Chromium browser.

“We're very happy with the success of our vulnerability reward program so far,” a Google spokesman said in an email.

To qualify for the Facebook bounties, researchers must privately report them here and give the company's security team a reasonable time to respond before publicly disclosing the flaws. Denial-of-service vulnerabilities, spam and social engineering techniques, and bugs in third-party apps and websites and in Facebook's corporate infrastructure don't qualify. ®

This article was updated to clarify details about Google bounties paid to date.

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.