Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The richest and biggest software company in the world still won’t pay researchers for disclosing vulnerabilities despite a growing number of its peers opting to do so.
Microsoft thinks bug bounties are superfluous: its Microsoft Security Response Centre (MSRC) team were constantly inundated with free vulnerability reports from researchers looking for fame, not fortune. Up to 80 per cent of Microsoft vulnerabilities were privately and freely reported.
Researchers had a variety of motivations behind reporting bugs and money was not necessarily chief among them, Microsoft security boss Mike Reavey said.
“I don’t think that filing and rewarding point issues is a long-term strategy to protect customers."
Redmond’s new BlueHat competition -- which pays handsomely for defensive security solutions -- was more effective, he said, and more appealing to those who consider security research an “intellectual pursuit”.
Reavey said BlueHat participants had respect because they were builders and breakers.
“Rewarding $200,000 for finding techniques that blocks an entire class of exploits scales better, and better protects customers.”
Companies including Google, Mozilla, Facebook and Samsung were some of an expanding list of companies prepared to shell out for privately-disclosed vulnerabilities.
PayPal was the latest to join that list this week after the company’s chief security officer Michael Barrett changed his tune on paying for vulnerabilities.
“I originally had reservations about the idea of paying researchers for bug reports, but I am happy to admit that the data has shown me to be wrong – it’s clearly an effective way to increase researchers’ attention on internet-based services and therefore find more potential issues,” Barrett said.
He said the experience from companies that pay for bugs was “very positive”.
Researchers could earn a dollar from Microsoft vulnerabilities through HP's Zero Day Initiative, which pays for reported bugs and supplies them to affected vendors for free.
Microsoft’s MSRC receives between 100,000 to 200,000 emails each year that range from critical vulnerability disclosures down to user requests to help deal with malware infections.
Of those, about 1000 were triaged and around 150 were considered vulnerabilities.
Only 16 have been released as more costly out-of-band security releases, and the remainder pushed through Microsoft’s monthly patch Tuesday updates.
Details on PayPal's bug bounty is available online.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.