Apple News

$1 Million Rewards for The Person Who Can Hack Apple Phone

$1 Million Rewards for The Person Who Can Hack Apple Phone

Apple has massively increased the amount it’s providing hackers for finding vulnerabilities in iPhones and Macs, up to $1 million. It’s by far the highest bug bounty on offer from any leading tech company.

That’s up from $200,000, and in the fall the program will be open to all researchers. Previously solely these on the company’s invite-only bug bounty program was eligible to obtain rewards.

As media reported on Monday, Apple can be launching a Mac bug bounty, which was confirmed Thursday, but it’s also extending it to watch OS and its Apple TV operating system. The announcements got here in Las Vegas on the Black Hat convention, the place Apple’s head of security engineering Ivan Krstić gave a chat on iOS and Mac OS security.

Forbes also revealed on Monday that Apple was to offer bug bounty participants “developer devices” iPhones that permit hackers to dive additional into iOS. They’ll, for instance, pause the processor to look at what’s taking place with data in reminiscence. Krstić confirmed the iOS Security Research Device program would be by application only. It is going to arrive subsequent year.

The total $1 million will go to researchers who can find a hack of the kernel the core of iOS with zero clicks required by the iPhone proprietor. One other $500,000 will be given to those that can find a “network attack requiring no person interplay.” There’s additionally a 50% bonus for hackers who can find weaknesses in software before it is released.

Apple is increasing these rewards within the face of an increasingly profitable private market the place hackers promote the same data to governments for vast sums.

As Maor Shwartz informed Forbes, the cost of a single exploit (a program that uses vulnerabilities usually to take control of a computer or phone) can fetch as a lot as $1.5 million. An exploit targeting WhatsApp the place no clicks are required from the person, for instance, might be bought to a authorities company for that much, though such instruments are rare. Only one or two a year will be sold, from a pool of around 400 researchers who deal with such excessive-finish hacking. “It’s arduous to research them and produce a working exploit,” he said.

About the author

Jay Timmons

Jay leads the team of two geeks dedicated for the Other Tech column. He is always found seeking information about development in the tech sector. He has been working with the group since 2016