Feeds

Twitter launches beer-money bug bounty

Finding flaws in avian network could earn you a whole $140

Top 5 reasons to deploy VMware with Tegile

Twitter has announced it will begin paying for newly-found vulnerabilities under a bug bounty that has quietly run since June.

The program, launched through third-party bounty outfit HackerOne, has so far garnered 44 reports, none of which were eligible for payments since they were submitted prior to today.

Twitter says it is lucky to have security researchers willing to hack it and "To recognise their efforts and the important role they play in keeping Twitter safe for everyone we offer a bounty for reporting certain qualifying security vulnerabilities."

The avian network has not set a maximum payment for bug bounties but its minimum is a measly US$140, a value normally reserved to reward users who spotted typos or the accidental use of Comic Sans in graphical interfaces.

By way of comparison, Google recently paid out $30,000 to one enterprising hacker who chained together a series of vulnerabilities to pop out of Chrome's sandbox.

Twitter won't say if it will pay similar sums, but has said it will write cheques for a "design or implementation issue that is reproducible and substantially affects the security of Twitter users". Eligible bugs include cross site scripting messes, cross site request forgery; remote code execution and unauthorised access to protected tweets or direct messages. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.