Archive for the ‘Bug Bounty’ Category

Reconnaissance for Bug Bounty Hunters & Pentesters

New to the bug bounty and confused about where to start? Worry not! This reconnaissance for bug bounty hunters guides you to take the first step in bug bounty hunting. Reconnaissance is the initial step in every penetration test, bug bounty, or ethical hacking. This step aims to gather the target’s information publicly available on […]

Leave a Comment

Serious Security: How to make sure you don’t miss bug reports!

Articles in our Serious Security series are often fairly technical, although we nevertheless aim to keep them free from jargon. In the past, we’ve dug into into topics that include: website hacking (and how to avoid it), numeric computation (and how to get it right), and post-quantum cryptography (and why we’re getting it). Helping others to help you This time, however, the Serious Security aspect […]

Leave a Comment

Beware of technical “experts” bombarding you with bug reports

We’re all appalled at scammers who take advantage of people’s fears to sell them products they don’t need, or worse still products that don’t exist and never arrive. Worst of all, perhaps, are the scammers who offer products and services that do exactly the opposite of what they claim – making their victims pay up […]

Leave a Comment

IN RARE ADMISSION, APPLE SAYS THREE SECURITY BUGS ‘ACTIVELY EXPLOITED’ BY HACKERS

Leave a Comment

Apple paid a $50,000 bounty to two bug bounty hunters for hacking its hosts

Leave a Comment